Jul 2 11:10:15.561515 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Mon Jul 1 23:45:21 -00 2024 Jul 2 11:10:15.561528 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 11:10:15.561535 kernel: BIOS-provided physical RAM map: Jul 2 11:10:15.561539 kernel: BIOS-e820: [mem 0x0000000000000000-0x00000000000997ff] usable Jul 2 11:10:15.561543 kernel: BIOS-e820: [mem 0x0000000000099800-0x000000000009ffff] reserved Jul 2 11:10:15.561546 kernel: BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved Jul 2 11:10:15.561551 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003fffffff] usable Jul 2 11:10:15.561555 kernel: BIOS-e820: [mem 0x0000000040000000-0x00000000403fffff] reserved Jul 2 11:10:15.561559 kernel: BIOS-e820: [mem 0x0000000040400000-0x0000000081b1dfff] usable Jul 2 11:10:15.561563 kernel: BIOS-e820: [mem 0x0000000081b1e000-0x0000000081b1efff] ACPI NVS Jul 2 11:10:15.561567 kernel: BIOS-e820: [mem 0x0000000081b1f000-0x0000000081b1ffff] reserved Jul 2 11:10:15.561571 kernel: BIOS-e820: [mem 0x0000000081b20000-0x000000008afccfff] usable Jul 2 11:10:15.561575 kernel: BIOS-e820: [mem 0x000000008afcd000-0x000000008c0b1fff] reserved Jul 2 11:10:15.561579 kernel: BIOS-e820: [mem 0x000000008c0b2000-0x000000008c23afff] usable Jul 2 11:10:15.561584 kernel: BIOS-e820: [mem 0x000000008c23b000-0x000000008c66cfff] ACPI NVS Jul 2 11:10:15.561589 kernel: BIOS-e820: [mem 0x000000008c66d000-0x000000008eefefff] reserved Jul 2 11:10:15.561593 kernel: BIOS-e820: [mem 0x000000008eeff000-0x000000008eefffff] usable Jul 2 11:10:15.561597 kernel: BIOS-e820: [mem 0x000000008ef00000-0x000000008fffffff] reserved Jul 2 11:10:15.561601 kernel: BIOS-e820: [mem 0x00000000e0000000-0x00000000efffffff] reserved Jul 2 11:10:15.561605 kernel: BIOS-e820: [mem 0x00000000fe000000-0x00000000fe010fff] reserved Jul 2 11:10:15.561609 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec00fff] reserved Jul 2 11:10:15.561614 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Jul 2 11:10:15.561618 kernel: BIOS-e820: [mem 0x00000000ff000000-0x00000000ffffffff] reserved Jul 2 11:10:15.561622 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000086effffff] usable Jul 2 11:10:15.561626 kernel: NX (Execute Disable) protection: active Jul 2 11:10:15.561630 kernel: SMBIOS 3.2.1 present. Jul 2 11:10:15.561635 kernel: DMI: Supermicro SYS-5019C-MR-PH004/X11SCM-F, BIOS 1.9 09/16/2022 Jul 2 11:10:15.561640 kernel: tsc: Detected 3400.000 MHz processor Jul 2 11:10:15.561644 kernel: tsc: Detected 3399.906 MHz TSC Jul 2 11:10:15.561648 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Jul 2 11:10:15.561653 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Jul 2 11:10:15.561657 kernel: last_pfn = 0x86f000 max_arch_pfn = 0x400000000 Jul 2 11:10:15.561662 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Jul 2 11:10:15.561666 kernel: last_pfn = 0x8ef00 max_arch_pfn = 0x400000000 Jul 2 11:10:15.561671 kernel: Using GB pages for direct mapping Jul 2 11:10:15.561675 kernel: ACPI: Early table checksum verification disabled Jul 2 11:10:15.561680 kernel: ACPI: RSDP 0x00000000000F05B0 000024 (v02 SUPERM) Jul 2 11:10:15.561684 kernel: ACPI: XSDT 0x000000008C54E0C8 00010C (v01 SUPERM SUPERM 01072009 AMI 00010013) Jul 2 11:10:15.561689 kernel: ACPI: FACP 0x000000008C58A670 000114 (v06 01072009 AMI 00010013) Jul 2 11:10:15.561693 kernel: ACPI: DSDT 0x000000008C54E268 03C404 (v02 SUPERM SMCI--MB 01072009 INTL 20160527) Jul 2 11:10:15.561699 kernel: ACPI: FACS 0x000000008C66CF80 000040 Jul 2 11:10:15.561704 kernel: ACPI: APIC 0x000000008C58A788 00012C (v04 01072009 AMI 00010013) Jul 2 11:10:15.561709 kernel: ACPI: FPDT 0x000000008C58A8B8 000044 (v01 01072009 AMI 00010013) Jul 2 11:10:15.561714 kernel: ACPI: FIDT 0x000000008C58A900 00009C (v01 SUPERM SMCI--MB 01072009 AMI 00010013) Jul 2 11:10:15.561719 kernel: ACPI: MCFG 0x000000008C58A9A0 00003C (v01 SUPERM SMCI--MB 01072009 MSFT 00000097) Jul 2 11:10:15.561724 kernel: ACPI: SPMI 0x000000008C58A9E0 000041 (v05 SUPERM SMCI--MB 00000000 AMI. 00000000) Jul 2 11:10:15.561728 kernel: ACPI: SSDT 0x000000008C58AA28 001B1C (v02 CpuRef CpuSsdt 00003000 INTL 20160527) Jul 2 11:10:15.561733 kernel: ACPI: SSDT 0x000000008C58C548 0031C6 (v02 SaSsdt SaSsdt 00003000 INTL 20160527) Jul 2 11:10:15.561738 kernel: ACPI: SSDT 0x000000008C58F710 00232B (v02 PegSsd PegSsdt 00001000 INTL 20160527) Jul 2 11:10:15.561742 kernel: ACPI: HPET 0x000000008C591A40 000038 (v01 SUPERM SMCI--MB 00000002 01000013) Jul 2 11:10:15.561748 kernel: ACPI: SSDT 0x000000008C591A78 000FAE (v02 SUPERM Ther_Rvp 00001000 INTL 20160527) Jul 2 11:10:15.561753 kernel: ACPI: SSDT 0x000000008C592A28 0008F4 (v02 INTEL xh_mossb 00000000 INTL 20160527) Jul 2 11:10:15.561757 kernel: ACPI: UEFI 0x000000008C593320 000042 (v01 SUPERM SMCI--MB 00000002 01000013) Jul 2 11:10:15.561762 kernel: ACPI: LPIT 0x000000008C593368 000094 (v01 SUPERM SMCI--MB 00000002 01000013) Jul 2 11:10:15.561767 kernel: ACPI: SSDT 0x000000008C593400 0027DE (v02 SUPERM PtidDevc 00001000 INTL 20160527) Jul 2 11:10:15.561771 kernel: ACPI: SSDT 0x000000008C595BE0 0014E2 (v02 SUPERM TbtTypeC 00000000 INTL 20160527) Jul 2 11:10:15.561776 kernel: ACPI: DBGP 0x000000008C5970C8 000034 (v01 SUPERM SMCI--MB 00000002 01000013) Jul 2 11:10:15.561781 kernel: ACPI: DBG2 0x000000008C597100 000054 (v00 SUPERM SMCI--MB 00000002 01000013) Jul 2 11:10:15.561786 kernel: ACPI: SSDT 0x000000008C597158 001B67 (v02 SUPERM UsbCTabl 00001000 INTL 20160527) Jul 2 11:10:15.561791 kernel: ACPI: DMAR 0x000000008C598CC0 000070 (v01 INTEL EDK2 00000002 01000013) Jul 2 11:10:15.561795 kernel: ACPI: SSDT 0x000000008C598D30 000144 (v02 Intel ADebTabl 00001000 INTL 20160527) Jul 2 11:10:15.561800 kernel: ACPI: TPM2 0x000000008C598E78 000034 (v04 SUPERM SMCI--MB 00000001 AMI 00000000) Jul 2 11:10:15.561805 kernel: ACPI: SSDT 0x000000008C598EB0 000D8F (v02 INTEL SpsNm 00000002 INTL 20160527) Jul 2 11:10:15.561809 kernel: ACPI: WSMT 0x000000008C599C40 000028 (v01 SUPERM 01072009 AMI 00010013) Jul 2 11:10:15.561814 kernel: ACPI: EINJ 0x000000008C599C68 000130 (v01 AMI AMI.EINJ 00000000 AMI. 00000000) Jul 2 11:10:15.561819 kernel: ACPI: ERST 0x000000008C599D98 000230 (v01 AMIER AMI.ERST 00000000 AMI. 00000000) Jul 2 11:10:15.561823 kernel: ACPI: BERT 0x000000008C599FC8 000030 (v01 AMI AMI.BERT 00000000 AMI. 00000000) Jul 2 11:10:15.561829 kernel: ACPI: HEST 0x000000008C599FF8 00027C (v01 AMI AMI.HEST 00000000 AMI. 00000000) Jul 2 11:10:15.561833 kernel: ACPI: SSDT 0x000000008C59A278 000162 (v01 SUPERM SMCCDN 00000000 INTL 20181221) Jul 2 11:10:15.561838 kernel: ACPI: Reserving FACP table memory at [mem 0x8c58a670-0x8c58a783] Jul 2 11:10:15.561843 kernel: ACPI: Reserving DSDT table memory at [mem 0x8c54e268-0x8c58a66b] Jul 2 11:10:15.561848 kernel: ACPI: Reserving FACS table memory at [mem 0x8c66cf80-0x8c66cfbf] Jul 2 11:10:15.561852 kernel: ACPI: Reserving APIC table memory at [mem 0x8c58a788-0x8c58a8b3] Jul 2 11:10:15.561857 kernel: ACPI: Reserving FPDT table memory at [mem 0x8c58a8b8-0x8c58a8fb] Jul 2 11:10:15.561861 kernel: ACPI: Reserving FIDT table memory at [mem 0x8c58a900-0x8c58a99b] Jul 2 11:10:15.561867 kernel: ACPI: Reserving MCFG table memory at [mem 0x8c58a9a0-0x8c58a9db] Jul 2 11:10:15.561871 kernel: ACPI: Reserving SPMI table memory at [mem 0x8c58a9e0-0x8c58aa20] Jul 2 11:10:15.561876 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58aa28-0x8c58c543] Jul 2 11:10:15.561880 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58c548-0x8c58f70d] Jul 2 11:10:15.561885 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c58f710-0x8c591a3a] Jul 2 11:10:15.561890 kernel: ACPI: Reserving HPET table memory at [mem 0x8c591a40-0x8c591a77] Jul 2 11:10:15.561894 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c591a78-0x8c592a25] Jul 2 11:10:15.561899 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c592a28-0x8c59331b] Jul 2 11:10:15.561904 kernel: ACPI: Reserving UEFI table memory at [mem 0x8c593320-0x8c593361] Jul 2 11:10:15.561909 kernel: ACPI: Reserving LPIT table memory at [mem 0x8c593368-0x8c5933fb] Jul 2 11:10:15.561914 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c593400-0x8c595bdd] Jul 2 11:10:15.561918 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c595be0-0x8c5970c1] Jul 2 11:10:15.561923 kernel: ACPI: Reserving DBGP table memory at [mem 0x8c5970c8-0x8c5970fb] Jul 2 11:10:15.561928 kernel: ACPI: Reserving DBG2 table memory at [mem 0x8c597100-0x8c597153] Jul 2 11:10:15.561932 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c597158-0x8c598cbe] Jul 2 11:10:15.561937 kernel: ACPI: Reserving DMAR table memory at [mem 0x8c598cc0-0x8c598d2f] Jul 2 11:10:15.561942 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598d30-0x8c598e73] Jul 2 11:10:15.561946 kernel: ACPI: Reserving TPM2 table memory at [mem 0x8c598e78-0x8c598eab] Jul 2 11:10:15.561952 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c598eb0-0x8c599c3e] Jul 2 11:10:15.561956 kernel: ACPI: Reserving WSMT table memory at [mem 0x8c599c40-0x8c599c67] Jul 2 11:10:15.561961 kernel: ACPI: Reserving EINJ table memory at [mem 0x8c599c68-0x8c599d97] Jul 2 11:10:15.561966 kernel: ACPI: Reserving ERST table memory at [mem 0x8c599d98-0x8c599fc7] Jul 2 11:10:15.561970 kernel: ACPI: Reserving BERT table memory at [mem 0x8c599fc8-0x8c599ff7] Jul 2 11:10:15.561975 kernel: ACPI: Reserving HEST table memory at [mem 0x8c599ff8-0x8c59a273] Jul 2 11:10:15.561979 kernel: ACPI: Reserving SSDT table memory at [mem 0x8c59a278-0x8c59a3d9] Jul 2 11:10:15.561984 kernel: No NUMA configuration found Jul 2 11:10:15.561989 kernel: Faking a node at [mem 0x0000000000000000-0x000000086effffff] Jul 2 11:10:15.561994 kernel: NODE_DATA(0) allocated [mem 0x86effa000-0x86effffff] Jul 2 11:10:15.561999 kernel: Zone ranges: Jul 2 11:10:15.562004 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Jul 2 11:10:15.562008 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Jul 2 11:10:15.562013 kernel: Normal [mem 0x0000000100000000-0x000000086effffff] Jul 2 11:10:15.562017 kernel: Movable zone start for each node Jul 2 11:10:15.562022 kernel: Early memory node ranges Jul 2 11:10:15.562027 kernel: node 0: [mem 0x0000000000001000-0x0000000000098fff] Jul 2 11:10:15.562031 kernel: node 0: [mem 0x0000000000100000-0x000000003fffffff] Jul 2 11:10:15.562036 kernel: node 0: [mem 0x0000000040400000-0x0000000081b1dfff] Jul 2 11:10:15.562041 kernel: node 0: [mem 0x0000000081b20000-0x000000008afccfff] Jul 2 11:10:15.562046 kernel: node 0: [mem 0x000000008c0b2000-0x000000008c23afff] Jul 2 11:10:15.562051 kernel: node 0: [mem 0x000000008eeff000-0x000000008eefffff] Jul 2 11:10:15.562055 kernel: node 0: [mem 0x0000000100000000-0x000000086effffff] Jul 2 11:10:15.562060 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000086effffff] Jul 2 11:10:15.562065 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Jul 2 11:10:15.562073 kernel: On node 0, zone DMA: 103 pages in unavailable ranges Jul 2 11:10:15.562078 kernel: On node 0, zone DMA32: 1024 pages in unavailable ranges Jul 2 11:10:15.562083 kernel: On node 0, zone DMA32: 2 pages in unavailable ranges Jul 2 11:10:15.562088 kernel: On node 0, zone DMA32: 4325 pages in unavailable ranges Jul 2 11:10:15.562094 kernel: On node 0, zone DMA32: 11460 pages in unavailable ranges Jul 2 11:10:15.562099 kernel: On node 0, zone Normal: 4352 pages in unavailable ranges Jul 2 11:10:15.562104 kernel: On node 0, zone Normal: 4096 pages in unavailable ranges Jul 2 11:10:15.562109 kernel: ACPI: PM-Timer IO Port: 0x1808 Jul 2 11:10:15.562114 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Jul 2 11:10:15.562119 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Jul 2 11:10:15.562124 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Jul 2 11:10:15.562129 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Jul 2 11:10:15.562134 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Jul 2 11:10:15.562139 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Jul 2 11:10:15.562144 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Jul 2 11:10:15.562149 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Jul 2 11:10:15.562154 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Jul 2 11:10:15.562159 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Jul 2 11:10:15.562164 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Jul 2 11:10:15.562169 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Jul 2 11:10:15.562174 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Jul 2 11:10:15.562179 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Jul 2 11:10:15.562184 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Jul 2 11:10:15.562189 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Jul 2 11:10:15.562194 kernel: IOAPIC[0]: apic_id 2, version 32, address 0xfec00000, GSI 0-119 Jul 2 11:10:15.562199 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Jul 2 11:10:15.562204 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Jul 2 11:10:15.562209 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Jul 2 11:10:15.562214 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Jul 2 11:10:15.562220 kernel: TSC deadline timer available Jul 2 11:10:15.562225 kernel: smpboot: Allowing 16 CPUs, 0 hotplug CPUs Jul 2 11:10:15.562230 kernel: [mem 0x90000000-0xdfffffff] available for PCI devices Jul 2 11:10:15.562235 kernel: Booting paravirtualized kernel on bare hardware Jul 2 11:10:15.562240 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Jul 2 11:10:15.562245 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:16 nr_node_ids:1 Jul 2 11:10:15.562250 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Jul 2 11:10:15.562255 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Jul 2 11:10:15.562259 kernel: pcpu-alloc: [0] 00 01 02 03 04 05 06 07 [0] 08 09 10 11 12 13 14 15 Jul 2 11:10:15.562283 kernel: Built 1 zonelists, mobility grouping on. Total pages: 8232415 Jul 2 11:10:15.562288 kernel: Policy zone: Normal Jul 2 11:10:15.562294 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 11:10:15.562299 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 11:10:15.562304 kernel: Dentry cache hash table entries: 4194304 (order: 13, 33554432 bytes, linear) Jul 2 11:10:15.562309 kernel: Inode-cache hash table entries: 2097152 (order: 12, 16777216 bytes, linear) Jul 2 11:10:15.562315 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 11:10:15.562320 kernel: Memory: 32722604K/33452980K available (12294K kernel code, 2276K rwdata, 13712K rodata, 47444K init, 4144K bss, 730116K reserved, 0K cma-reserved) Jul 2 11:10:15.562340 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=16, Nodes=1 Jul 2 11:10:15.562345 kernel: ftrace: allocating 34514 entries in 135 pages Jul 2 11:10:15.562350 kernel: ftrace: allocated 135 pages with 4 groups Jul 2 11:10:15.562355 kernel: rcu: Hierarchical RCU implementation. Jul 2 11:10:15.562360 kernel: rcu: RCU event tracing is enabled. Jul 2 11:10:15.562365 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=16. Jul 2 11:10:15.562370 kernel: Rude variant of Tasks RCU enabled. Jul 2 11:10:15.562376 kernel: Tracing variant of Tasks RCU enabled. Jul 2 11:10:15.562381 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 11:10:15.562386 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=16 Jul 2 11:10:15.562391 kernel: NR_IRQS: 33024, nr_irqs: 2184, preallocated irqs: 16 Jul 2 11:10:15.562396 kernel: random: crng init done Jul 2 11:10:15.562401 kernel: Console: colour dummy device 80x25 Jul 2 11:10:15.562406 kernel: printk: console [tty0] enabled Jul 2 11:10:15.562411 kernel: printk: console [ttyS1] enabled Jul 2 11:10:15.562416 kernel: ACPI: Core revision 20210730 Jul 2 11:10:15.562421 kernel: hpet: HPET dysfunctional in PC10. Force disabled. Jul 2 11:10:15.562426 kernel: APIC: Switch to symmetric I/O mode setup Jul 2 11:10:15.562432 kernel: DMAR: Host address width 39 Jul 2 11:10:15.562437 kernel: DMAR: DRHD base: 0x000000fed91000 flags: 0x1 Jul 2 11:10:15.562442 kernel: DMAR: dmar0: reg_base_addr fed91000 ver 1:0 cap d2008c40660462 ecap f050da Jul 2 11:10:15.562447 kernel: DMAR: RMRR base: 0x0000008cf18000 end: 0x0000008d161fff Jul 2 11:10:15.562452 kernel: DMAR-IR: IOAPIC id 2 under DRHD base 0xfed91000 IOMMU 0 Jul 2 11:10:15.562457 kernel: DMAR-IR: HPET id 0 under DRHD base 0xfed91000 Jul 2 11:10:15.562462 kernel: DMAR-IR: Queued invalidation will be enabled to support x2apic and Intr-remapping. Jul 2 11:10:15.562467 kernel: DMAR-IR: Enabled IRQ remapping in x2apic mode Jul 2 11:10:15.562472 kernel: x2apic enabled Jul 2 11:10:15.562477 kernel: Switched APIC routing to cluster x2apic. Jul 2 11:10:15.562482 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x3101f59f5e6, max_idle_ns: 440795259996 ns Jul 2 11:10:15.562487 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 6799.81 BogoMIPS (lpj=3399906) Jul 2 11:10:15.562492 kernel: CPU0: Thermal monitoring enabled (TM1) Jul 2 11:10:15.562497 kernel: process: using mwait in idle threads Jul 2 11:10:15.562502 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Jul 2 11:10:15.562507 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Jul 2 11:10:15.562512 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Jul 2 11:10:15.562517 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Jul 2 11:10:15.562523 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Jul 2 11:10:15.562528 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Jul 2 11:10:15.562533 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Jul 2 11:10:15.562537 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Jul 2 11:10:15.562542 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Jul 2 11:10:15.562547 kernel: RETBleed: Mitigation: Enhanced IBRS Jul 2 11:10:15.562552 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Jul 2 11:10:15.562557 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Jul 2 11:10:15.562562 kernel: TAA: Mitigation: TSX disabled Jul 2 11:10:15.562567 kernel: MMIO Stale Data: Mitigation: Clear CPU buffers Jul 2 11:10:15.562572 kernel: SRBDS: Mitigation: Microcode Jul 2 11:10:15.562577 kernel: GDS: Vulnerable: No microcode Jul 2 11:10:15.562582 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Jul 2 11:10:15.562587 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Jul 2 11:10:15.562592 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Jul 2 11:10:15.562597 kernel: x86/fpu: Supporting XSAVE feature 0x008: 'MPX bounds registers' Jul 2 11:10:15.562602 kernel: x86/fpu: Supporting XSAVE feature 0x010: 'MPX CSR' Jul 2 11:10:15.562607 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Jul 2 11:10:15.562612 kernel: x86/fpu: xstate_offset[3]: 832, xstate_sizes[3]: 64 Jul 2 11:10:15.562616 kernel: x86/fpu: xstate_offset[4]: 896, xstate_sizes[4]: 64 Jul 2 11:10:15.562621 kernel: x86/fpu: Enabled xstate features 0x1f, context size is 960 bytes, using 'compacted' format. Jul 2 11:10:15.562626 kernel: Freeing SMP alternatives memory: 32K Jul 2 11:10:15.562632 kernel: pid_max: default: 32768 minimum: 301 Jul 2 11:10:15.562637 kernel: LSM: Security Framework initializing Jul 2 11:10:15.562641 kernel: SELinux: Initializing. Jul 2 11:10:15.562646 kernel: Mount-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 11:10:15.562651 kernel: Mountpoint-cache hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 11:10:15.562656 kernel: smpboot: Estimated ratio of average max frequency by base frequency (times 1024): 1445 Jul 2 11:10:15.562661 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Jul 2 11:10:15.562666 kernel: Performance Events: PEBS fmt3+, Skylake events, 32-deep LBR, full-width counters, Intel PMU driver. Jul 2 11:10:15.562671 kernel: ... version: 4 Jul 2 11:10:15.562676 kernel: ... bit width: 48 Jul 2 11:10:15.562681 kernel: ... generic registers: 4 Jul 2 11:10:15.562687 kernel: ... value mask: 0000ffffffffffff Jul 2 11:10:15.562691 kernel: ... max period: 00007fffffffffff Jul 2 11:10:15.562696 kernel: ... fixed-purpose events: 3 Jul 2 11:10:15.562701 kernel: ... event mask: 000000070000000f Jul 2 11:10:15.562706 kernel: signal: max sigframe size: 2032 Jul 2 11:10:15.562711 kernel: rcu: Hierarchical SRCU implementation. Jul 2 11:10:15.562716 kernel: NMI watchdog: Enabled. Permanently consumes one hw-PMU counter. Jul 2 11:10:15.562721 kernel: smp: Bringing up secondary CPUs ... Jul 2 11:10:15.562726 kernel: x86: Booting SMP configuration: Jul 2 11:10:15.562732 kernel: .... node #0, CPUs: #1 #2 #3 #4 #5 #6 #7 #8 Jul 2 11:10:15.562737 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Jul 2 11:10:15.562742 kernel: #9 #10 #11 #12 #13 #14 #15 Jul 2 11:10:15.562747 kernel: smp: Brought up 1 node, 16 CPUs Jul 2 11:10:15.562752 kernel: smpboot: Max logical packages: 1 Jul 2 11:10:15.562757 kernel: smpboot: Total of 16 processors activated (108796.99 BogoMIPS) Jul 2 11:10:15.562762 kernel: devtmpfs: initialized Jul 2 11:10:15.562767 kernel: x86/mm: Memory block size: 128MB Jul 2 11:10:15.562772 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x81b1e000-0x81b1efff] (4096 bytes) Jul 2 11:10:15.562778 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x8c23b000-0x8c66cfff] (4399104 bytes) Jul 2 11:10:15.562783 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 11:10:15.562788 kernel: futex hash table entries: 4096 (order: 6, 262144 bytes, linear) Jul 2 11:10:15.562792 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 11:10:15.562798 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 11:10:15.562803 kernel: audit: initializing netlink subsys (disabled) Jul 2 11:10:15.562808 kernel: audit: type=2000 audit(1719918610.041:1): state=initialized audit_enabled=0 res=1 Jul 2 11:10:15.562812 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 11:10:15.562817 kernel: thermal_sys: Registered thermal governor 'user_space' Jul 2 11:10:15.562823 kernel: cpuidle: using governor menu Jul 2 11:10:15.562828 kernel: ACPI: bus type PCI registered Jul 2 11:10:15.562833 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 11:10:15.562838 kernel: dca service started, version 1.12.1 Jul 2 11:10:15.562843 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xe0000000-0xefffffff] (base 0xe0000000) Jul 2 11:10:15.562848 kernel: PCI: MMCONFIG at [mem 0xe0000000-0xefffffff] reserved in E820 Jul 2 11:10:15.562853 kernel: PCI: Using configuration type 1 for base access Jul 2 11:10:15.562858 kernel: ENERGY_PERF_BIAS: Set to 'normal', was 'performance' Jul 2 11:10:15.562863 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Jul 2 11:10:15.562868 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 11:10:15.562873 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 11:10:15.562878 kernel: ACPI: Added _OSI(Module Device) Jul 2 11:10:15.562883 kernel: ACPI: Added _OSI(Processor Device) Jul 2 11:10:15.562888 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 11:10:15.562893 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 11:10:15.562898 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 11:10:15.562903 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 11:10:15.562908 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 11:10:15.562914 kernel: ACPI: 12 ACPI AML tables successfully acquired and loaded Jul 2 11:10:15.562918 kernel: ACPI: Dynamic OEM Table Load: Jul 2 11:10:15.562923 kernel: ACPI: SSDT 0xFFFFA01880220900 0000F4 (v02 PmRef Cpu0Psd 00003000 INTL 20160527) Jul 2 11:10:15.562929 kernel: ACPI: \_SB_.PR00: _OSC native thermal LVT Acked Jul 2 11:10:15.562933 kernel: ACPI: Dynamic OEM Table Load: Jul 2 11:10:15.562938 kernel: ACPI: SSDT 0xFFFFA01881AEB400 000400 (v02 PmRef Cpu0Cst 00003001 INTL 20160527) Jul 2 11:10:15.562943 kernel: ACPI: Dynamic OEM Table Load: Jul 2 11:10:15.562948 kernel: ACPI: SSDT 0xFFFFA01881A66000 000683 (v02 PmRef Cpu0Ist 00003000 INTL 20160527) Jul 2 11:10:15.562953 kernel: ACPI: Dynamic OEM Table Load: Jul 2 11:10:15.562959 kernel: ACPI: SSDT 0xFFFFA01881B56000 0005FC (v02 PmRef ApIst 00003000 INTL 20160527) Jul 2 11:10:15.562964 kernel: ACPI: Dynamic OEM Table Load: Jul 2 11:10:15.562969 kernel: ACPI: SSDT 0xFFFFA01880154000 000AB0 (v02 PmRef ApPsd 00003000 INTL 20160527) Jul 2 11:10:15.562973 kernel: ACPI: Dynamic OEM Table Load: Jul 2 11:10:15.562978 kernel: ACPI: SSDT 0xFFFFA01881AEC800 00030A (v02 PmRef ApCst 00003000 INTL 20160527) Jul 2 11:10:15.562983 kernel: ACPI: Interpreter enabled Jul 2 11:10:15.562988 kernel: ACPI: PM: (supports S0 S5) Jul 2 11:10:15.562993 kernel: ACPI: Using IOAPIC for interrupt routing Jul 2 11:10:15.562998 kernel: HEST: Enabling Firmware First mode for corrected errors. Jul 2 11:10:15.563004 kernel: mce: [Firmware Bug]: Ignoring request to disable invalid MCA bank 14. Jul 2 11:10:15.563009 kernel: HEST: Table parsing has been initialized. Jul 2 11:10:15.563014 kernel: GHES: APEI firmware first mode is enabled by APEI bit and WHEA _OSC. Jul 2 11:10:15.563019 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Jul 2 11:10:15.563024 kernel: ACPI: Enabled 9 GPEs in block 00 to 7F Jul 2 11:10:15.563029 kernel: ACPI: PM: Power Resource [USBC] Jul 2 11:10:15.563034 kernel: ACPI: PM: Power Resource [V0PR] Jul 2 11:10:15.563038 kernel: ACPI: PM: Power Resource [V1PR] Jul 2 11:10:15.563043 kernel: ACPI: PM: Power Resource [V2PR] Jul 2 11:10:15.563048 kernel: ACPI: PM: Power Resource [WRST] Jul 2 11:10:15.563054 kernel: ACPI: PM: Power Resource [FN00] Jul 2 11:10:15.563059 kernel: ACPI: PM: Power Resource [FN01] Jul 2 11:10:15.563064 kernel: ACPI: PM: Power Resource [FN02] Jul 2 11:10:15.563068 kernel: ACPI: PM: Power Resource [FN03] Jul 2 11:10:15.563073 kernel: ACPI: PM: Power Resource [FN04] Jul 2 11:10:15.563078 kernel: ACPI: PM: Power Resource [PIN] Jul 2 11:10:15.563083 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-fe]) Jul 2 11:10:15.563149 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 2 11:10:15.563197 kernel: acpi PNP0A08:00: _OSC: platform does not support [AER] Jul 2 11:10:15.563240 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability LTR] Jul 2 11:10:15.563247 kernel: PCI host bridge to bus 0000:00 Jul 2 11:10:15.563328 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Jul 2 11:10:15.563367 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Jul 2 11:10:15.563405 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Jul 2 11:10:15.563442 kernel: pci_bus 0000:00: root bus resource [mem 0x90000000-0xdfffffff window] Jul 2 11:10:15.563480 kernel: pci_bus 0000:00: root bus resource [mem 0xfc800000-0xfe7fffff window] Jul 2 11:10:15.563517 kernel: pci_bus 0000:00: root bus resource [bus 00-fe] Jul 2 11:10:15.563568 kernel: pci 0000:00:00.0: [8086:3e31] type 00 class 0x060000 Jul 2 11:10:15.563619 kernel: pci 0000:00:01.0: [8086:1901] type 01 class 0x060400 Jul 2 11:10:15.563663 kernel: pci 0000:00:01.0: PME# supported from D0 D3hot D3cold Jul 2 11:10:15.563710 kernel: pci 0000:00:08.0: [8086:1911] type 00 class 0x088000 Jul 2 11:10:15.563755 kernel: pci 0000:00:08.0: reg 0x10: [mem 0x9551f000-0x9551ffff 64bit] Jul 2 11:10:15.563802 kernel: pci 0000:00:12.0: [8086:a379] type 00 class 0x118000 Jul 2 11:10:15.563844 kernel: pci 0000:00:12.0: reg 0x10: [mem 0x9551e000-0x9551efff 64bit] Jul 2 11:10:15.563890 kernel: pci 0000:00:14.0: [8086:a36d] type 00 class 0x0c0330 Jul 2 11:10:15.563933 kernel: pci 0000:00:14.0: reg 0x10: [mem 0x95500000-0x9550ffff 64bit] Jul 2 11:10:15.563976 kernel: pci 0000:00:14.0: PME# supported from D3hot D3cold Jul 2 11:10:15.564023 kernel: pci 0000:00:14.2: [8086:a36f] type 00 class 0x050000 Jul 2 11:10:15.564066 kernel: pci 0000:00:14.2: reg 0x10: [mem 0x95512000-0x95513fff 64bit] Jul 2 11:10:15.564108 kernel: pci 0000:00:14.2: reg 0x18: [mem 0x9551d000-0x9551dfff 64bit] Jul 2 11:10:15.564153 kernel: pci 0000:00:15.0: [8086:a368] type 00 class 0x0c8000 Jul 2 11:10:15.564196 kernel: pci 0000:00:15.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Jul 2 11:10:15.564243 kernel: pci 0000:00:15.1: [8086:a369] type 00 class 0x0c8000 Jul 2 11:10:15.564309 kernel: pci 0000:00:15.1: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Jul 2 11:10:15.564368 kernel: pci 0000:00:16.0: [8086:a360] type 00 class 0x078000 Jul 2 11:10:15.564411 kernel: pci 0000:00:16.0: reg 0x10: [mem 0x9551a000-0x9551afff 64bit] Jul 2 11:10:15.564452 kernel: pci 0000:00:16.0: PME# supported from D3hot Jul 2 11:10:15.564496 kernel: pci 0000:00:16.1: [8086:a361] type 00 class 0x078000 Jul 2 11:10:15.564539 kernel: pci 0000:00:16.1: reg 0x10: [mem 0x95519000-0x95519fff 64bit] Jul 2 11:10:15.564581 kernel: pci 0000:00:16.1: PME# supported from D3hot Jul 2 11:10:15.564628 kernel: pci 0000:00:16.4: [8086:a364] type 00 class 0x078000 Jul 2 11:10:15.564671 kernel: pci 0000:00:16.4: reg 0x10: [mem 0x95518000-0x95518fff 64bit] Jul 2 11:10:15.564712 kernel: pci 0000:00:16.4: PME# supported from D3hot Jul 2 11:10:15.564757 kernel: pci 0000:00:17.0: [8086:a352] type 00 class 0x010601 Jul 2 11:10:15.564800 kernel: pci 0000:00:17.0: reg 0x10: [mem 0x95510000-0x95511fff] Jul 2 11:10:15.564844 kernel: pci 0000:00:17.0: reg 0x14: [mem 0x95517000-0x955170ff] Jul 2 11:10:15.564890 kernel: pci 0000:00:17.0: reg 0x18: [io 0x6050-0x6057] Jul 2 11:10:15.564935 kernel: pci 0000:00:17.0: reg 0x1c: [io 0x6040-0x6043] Jul 2 11:10:15.564976 kernel: pci 0000:00:17.0: reg 0x20: [io 0x6020-0x603f] Jul 2 11:10:15.565019 kernel: pci 0000:00:17.0: reg 0x24: [mem 0x95516000-0x955167ff] Jul 2 11:10:15.565060 kernel: pci 0000:00:17.0: PME# supported from D3hot Jul 2 11:10:15.565107 kernel: pci 0000:00:1b.0: [8086:a340] type 01 class 0x060400 Jul 2 11:10:15.565149 kernel: pci 0000:00:1b.0: PME# supported from D0 D3hot D3cold Jul 2 11:10:15.565198 kernel: pci 0000:00:1b.4: [8086:a32c] type 01 class 0x060400 Jul 2 11:10:15.565243 kernel: pci 0000:00:1b.4: PME# supported from D0 D3hot D3cold Jul 2 11:10:15.565326 kernel: pci 0000:00:1b.5: [8086:a32d] type 01 class 0x060400 Jul 2 11:10:15.565369 kernel: pci 0000:00:1b.5: PME# supported from D0 D3hot D3cold Jul 2 11:10:15.565416 kernel: pci 0000:00:1c.0: [8086:a338] type 01 class 0x060400 Jul 2 11:10:15.565460 kernel: pci 0000:00:1c.0: PME# supported from D0 D3hot D3cold Jul 2 11:10:15.565509 kernel: pci 0000:00:1c.3: [8086:a33b] type 01 class 0x060400 Jul 2 11:10:15.565552 kernel: pci 0000:00:1c.3: PME# supported from D0 D3hot D3cold Jul 2 11:10:15.565599 kernel: pci 0000:00:1e.0: [8086:a328] type 00 class 0x078000 Jul 2 11:10:15.565641 kernel: pci 0000:00:1e.0: reg 0x10: [mem 0x00000000-0x00000fff 64bit] Jul 2 11:10:15.565689 kernel: pci 0000:00:1f.0: [8086:a309] type 00 class 0x060100 Jul 2 11:10:15.565736 kernel: pci 0000:00:1f.4: [8086:a323] type 00 class 0x0c0500 Jul 2 11:10:15.565779 kernel: pci 0000:00:1f.4: reg 0x10: [mem 0x95514000-0x955140ff 64bit] Jul 2 11:10:15.565821 kernel: pci 0000:00:1f.4: reg 0x20: [io 0xefa0-0xefbf] Jul 2 11:10:15.565869 kernel: pci 0000:00:1f.5: [8086:a324] type 00 class 0x0c8000 Jul 2 11:10:15.565911 kernel: pci 0000:00:1f.5: reg 0x10: [mem 0xfe010000-0xfe010fff] Jul 2 11:10:15.565961 kernel: pci 0000:01:00.0: [15b3:1015] type 00 class 0x020000 Jul 2 11:10:15.566005 kernel: pci 0000:01:00.0: reg 0x10: [mem 0x92000000-0x93ffffff 64bit pref] Jul 2 11:10:15.566048 kernel: pci 0000:01:00.0: reg 0x30: [mem 0x95200000-0x952fffff pref] Jul 2 11:10:15.566093 kernel: pci 0000:01:00.0: PME# supported from D3cold Jul 2 11:10:15.566136 kernel: pci 0000:01:00.0: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Jul 2 11:10:15.566179 kernel: pci 0000:01:00.0: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Jul 2 11:10:15.566229 kernel: pci 0000:01:00.1: [15b3:1015] type 00 class 0x020000 Jul 2 11:10:15.566297 kernel: pci 0000:01:00.1: reg 0x10: [mem 0x90000000-0x91ffffff 64bit pref] Jul 2 11:10:15.566361 kernel: pci 0000:01:00.1: reg 0x30: [mem 0x95100000-0x951fffff pref] Jul 2 11:10:15.566404 kernel: pci 0000:01:00.1: PME# supported from D3cold Jul 2 11:10:15.566448 kernel: pci 0000:01:00.1: reg 0x1a4: [mem 0x00000000-0x000fffff 64bit pref] Jul 2 11:10:15.566492 kernel: pci 0000:01:00.1: VF(n) BAR0 space: [mem 0x00000000-0x007fffff 64bit pref] (contains BAR0 for 8 VFs) Jul 2 11:10:15.566535 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Jul 2 11:10:15.566578 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Jul 2 11:10:15.566622 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Jul 2 11:10:15.566664 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Jul 2 11:10:15.566713 kernel: pci 0000:03:00.0: working around ROM BAR overlap defect Jul 2 11:10:15.566757 kernel: pci 0000:03:00.0: [8086:1533] type 00 class 0x020000 Jul 2 11:10:15.566802 kernel: pci 0000:03:00.0: reg 0x10: [mem 0x95400000-0x9547ffff] Jul 2 11:10:15.566845 kernel: pci 0000:03:00.0: reg 0x18: [io 0x5000-0x501f] Jul 2 11:10:15.566889 kernel: pci 0000:03:00.0: reg 0x1c: [mem 0x95480000-0x95483fff] Jul 2 11:10:15.566932 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Jul 2 11:10:15.566978 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Jul 2 11:10:15.567020 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Jul 2 11:10:15.567063 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Jul 2 11:10:15.567141 kernel: pci 0000:04:00.0: working around ROM BAR overlap defect Jul 2 11:10:15.567207 kernel: pci 0000:04:00.0: [8086:1533] type 00 class 0x020000 Jul 2 11:10:15.567252 kernel: pci 0000:04:00.0: reg 0x10: [mem 0x95300000-0x9537ffff] Jul 2 11:10:15.567299 kernel: pci 0000:04:00.0: reg 0x18: [io 0x4000-0x401f] Jul 2 11:10:15.567365 kernel: pci 0000:04:00.0: reg 0x1c: [mem 0x95380000-0x95383fff] Jul 2 11:10:15.567408 kernel: pci 0000:04:00.0: PME# supported from D0 D3hot D3cold Jul 2 11:10:15.567452 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Jul 2 11:10:15.567494 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Jul 2 11:10:15.567538 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Jul 2 11:10:15.567581 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Jul 2 11:10:15.567630 kernel: pci 0000:06:00.0: [1a03:1150] type 01 class 0x060400 Jul 2 11:10:15.567675 kernel: pci 0000:06:00.0: enabling Extended Tags Jul 2 11:10:15.567720 kernel: pci 0000:06:00.0: supports D1 D2 Jul 2 11:10:15.567763 kernel: pci 0000:06:00.0: PME# supported from D0 D1 D2 D3hot D3cold Jul 2 11:10:15.567806 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Jul 2 11:10:15.567848 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Jul 2 11:10:15.567891 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Jul 2 11:10:15.567940 kernel: pci_bus 0000:07: extended config space not accessible Jul 2 11:10:15.567990 kernel: pci 0000:07:00.0: [1a03:2000] type 00 class 0x030000 Jul 2 11:10:15.568039 kernel: pci 0000:07:00.0: reg 0x10: [mem 0x94000000-0x94ffffff] Jul 2 11:10:15.568084 kernel: pci 0000:07:00.0: reg 0x14: [mem 0x95000000-0x9501ffff] Jul 2 11:10:15.568131 kernel: pci 0000:07:00.0: reg 0x18: [io 0x3000-0x307f] Jul 2 11:10:15.568176 kernel: pci 0000:07:00.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Jul 2 11:10:15.568222 kernel: pci 0000:07:00.0: supports D1 D2 Jul 2 11:10:15.568271 kernel: pci 0000:07:00.0: PME# supported from D0 D1 D2 D3hot D3cold Jul 2 11:10:15.568361 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Jul 2 11:10:15.568407 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Jul 2 11:10:15.568451 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Jul 2 11:10:15.568459 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 0 Jul 2 11:10:15.568465 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 1 Jul 2 11:10:15.568470 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 0 Jul 2 11:10:15.568475 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 0 Jul 2 11:10:15.568480 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 0 Jul 2 11:10:15.568486 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 0 Jul 2 11:10:15.568491 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 0 Jul 2 11:10:15.568498 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 0 Jul 2 11:10:15.568503 kernel: iommu: Default domain type: Translated Jul 2 11:10:15.568508 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Jul 2 11:10:15.568553 kernel: pci 0000:07:00.0: vgaarb: setting as boot VGA device Jul 2 11:10:15.568599 kernel: pci 0000:07:00.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Jul 2 11:10:15.568645 kernel: pci 0000:07:00.0: vgaarb: bridge control possible Jul 2 11:10:15.568654 kernel: vgaarb: loaded Jul 2 11:10:15.568660 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 11:10:15.568666 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 11:10:15.568672 kernel: PTP clock support registered Jul 2 11:10:15.568677 kernel: PCI: Using ACPI for IRQ routing Jul 2 11:10:15.568682 kernel: PCI: pci_cache_line_size set to 64 bytes Jul 2 11:10:15.568688 kernel: e820: reserve RAM buffer [mem 0x00099800-0x0009ffff] Jul 2 11:10:15.568693 kernel: e820: reserve RAM buffer [mem 0x81b1e000-0x83ffffff] Jul 2 11:10:15.568698 kernel: e820: reserve RAM buffer [mem 0x8afcd000-0x8bffffff] Jul 2 11:10:15.568703 kernel: e820: reserve RAM buffer [mem 0x8c23b000-0x8fffffff] Jul 2 11:10:15.568708 kernel: e820: reserve RAM buffer [mem 0x8ef00000-0x8fffffff] Jul 2 11:10:15.568714 kernel: e820: reserve RAM buffer [mem 0x86f000000-0x86fffffff] Jul 2 11:10:15.568719 kernel: clocksource: Switched to clocksource tsc-early Jul 2 11:10:15.568725 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 11:10:15.568730 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 11:10:15.568735 kernel: pnp: PnP ACPI init Jul 2 11:10:15.568780 kernel: system 00:00: [mem 0x40000000-0x403fffff] has been reserved Jul 2 11:10:15.568824 kernel: pnp 00:02: [dma 0 disabled] Jul 2 11:10:15.568866 kernel: pnp 00:03: [dma 0 disabled] Jul 2 11:10:15.568912 kernel: system 00:04: [io 0x0680-0x069f] has been reserved Jul 2 11:10:15.568951 kernel: system 00:04: [io 0x164e-0x164f] has been reserved Jul 2 11:10:15.568992 kernel: system 00:05: [io 0x1854-0x1857] has been reserved Jul 2 11:10:15.569034 kernel: system 00:06: [mem 0xfed10000-0xfed17fff] has been reserved Jul 2 11:10:15.569073 kernel: system 00:06: [mem 0xfed18000-0xfed18fff] has been reserved Jul 2 11:10:15.569110 kernel: system 00:06: [mem 0xfed19000-0xfed19fff] has been reserved Jul 2 11:10:15.569150 kernel: system 00:06: [mem 0xe0000000-0xefffffff] has been reserved Jul 2 11:10:15.569188 kernel: system 00:06: [mem 0xfed20000-0xfed3ffff] has been reserved Jul 2 11:10:15.569226 kernel: system 00:06: [mem 0xfed90000-0xfed93fff] could not be reserved Jul 2 11:10:15.569266 kernel: system 00:06: [mem 0xfed45000-0xfed8ffff] has been reserved Jul 2 11:10:15.569349 kernel: system 00:06: [mem 0xfee00000-0xfeefffff] could not be reserved Jul 2 11:10:15.569390 kernel: system 00:07: [io 0x1800-0x18fe] could not be reserved Jul 2 11:10:15.569428 kernel: system 00:07: [mem 0xfd000000-0xfd69ffff] has been reserved Jul 2 11:10:15.569469 kernel: system 00:07: [mem 0xfd6c0000-0xfd6cffff] has been reserved Jul 2 11:10:15.569506 kernel: system 00:07: [mem 0xfd6f0000-0xfdffffff] has been reserved Jul 2 11:10:15.569543 kernel: system 00:07: [mem 0xfe000000-0xfe01ffff] could not be reserved Jul 2 11:10:15.569581 kernel: system 00:07: [mem 0xfe200000-0xfe7fffff] has been reserved Jul 2 11:10:15.569620 kernel: system 00:07: [mem 0xff000000-0xffffffff] has been reserved Jul 2 11:10:15.569662 kernel: system 00:08: [io 0x2000-0x20fe] has been reserved Jul 2 11:10:15.569670 kernel: pnp: PnP ACPI: found 10 devices Jul 2 11:10:15.569676 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Jul 2 11:10:15.569682 kernel: NET: Registered PF_INET protocol family Jul 2 11:10:15.569688 kernel: IP idents hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 11:10:15.569693 kernel: tcp_listen_portaddr_hash hash table entries: 16384 (order: 6, 262144 bytes, linear) Jul 2 11:10:15.569698 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 11:10:15.569704 kernel: TCP established hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 11:10:15.569709 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Jul 2 11:10:15.569714 kernel: TCP: Hash tables configured (established 262144 bind 65536) Jul 2 11:10:15.569720 kernel: UDP hash table entries: 16384 (order: 7, 524288 bytes, linear) Jul 2 11:10:15.569726 kernel: UDP-Lite hash table entries: 16384 (order: 7, 524288 bytes, linear) Jul 2 11:10:15.569731 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 11:10:15.569737 kernel: NET: Registered PF_XDP protocol family Jul 2 11:10:15.569780 kernel: pci 0000:00:15.0: BAR 0: assigned [mem 0x95515000-0x95515fff 64bit] Jul 2 11:10:15.569823 kernel: pci 0000:00:15.1: BAR 0: assigned [mem 0x9551b000-0x9551bfff 64bit] Jul 2 11:10:15.569865 kernel: pci 0000:00:1e.0: BAR 0: assigned [mem 0x9551c000-0x9551cfff 64bit] Jul 2 11:10:15.569911 kernel: pci 0000:01:00.0: BAR 7: no space for [mem size 0x00800000 64bit pref] Jul 2 11:10:15.569955 kernel: pci 0000:01:00.0: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Jul 2 11:10:15.570001 kernel: pci 0000:01:00.1: BAR 7: no space for [mem size 0x00800000 64bit pref] Jul 2 11:10:15.570045 kernel: pci 0000:01:00.1: BAR 7: failed to assign [mem size 0x00800000 64bit pref] Jul 2 11:10:15.570088 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Jul 2 11:10:15.570131 kernel: pci 0000:00:01.0: bridge window [mem 0x95100000-0x952fffff] Jul 2 11:10:15.570174 kernel: pci 0000:00:01.0: bridge window [mem 0x90000000-0x93ffffff 64bit pref] Jul 2 11:10:15.570218 kernel: pci 0000:00:1b.0: PCI bridge to [bus 02] Jul 2 11:10:15.570262 kernel: pci 0000:00:1b.4: PCI bridge to [bus 03] Jul 2 11:10:15.570352 kernel: pci 0000:00:1b.4: bridge window [io 0x5000-0x5fff] Jul 2 11:10:15.570395 kernel: pci 0000:00:1b.4: bridge window [mem 0x95400000-0x954fffff] Jul 2 11:10:15.570437 kernel: pci 0000:00:1b.5: PCI bridge to [bus 04] Jul 2 11:10:15.570480 kernel: pci 0000:00:1b.5: bridge window [io 0x4000-0x4fff] Jul 2 11:10:15.570521 kernel: pci 0000:00:1b.5: bridge window [mem 0x95300000-0x953fffff] Jul 2 11:10:15.570564 kernel: pci 0000:00:1c.0: PCI bridge to [bus 05] Jul 2 11:10:15.570610 kernel: pci 0000:06:00.0: PCI bridge to [bus 07] Jul 2 11:10:15.570654 kernel: pci 0000:06:00.0: bridge window [io 0x3000-0x3fff] Jul 2 11:10:15.570698 kernel: pci 0000:06:00.0: bridge window [mem 0x94000000-0x950fffff] Jul 2 11:10:15.570741 kernel: pci 0000:00:1c.3: PCI bridge to [bus 06-07] Jul 2 11:10:15.570783 kernel: pci 0000:00:1c.3: bridge window [io 0x3000-0x3fff] Jul 2 11:10:15.570825 kernel: pci 0000:00:1c.3: bridge window [mem 0x94000000-0x950fffff] Jul 2 11:10:15.570865 kernel: pci_bus 0000:00: Some PCI device resources are unassigned, try booting with pci=realloc Jul 2 11:10:15.570902 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Jul 2 11:10:15.570940 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Jul 2 11:10:15.570979 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Jul 2 11:10:15.571016 kernel: pci_bus 0000:00: resource 7 [mem 0x90000000-0xdfffffff window] Jul 2 11:10:15.571053 kernel: pci_bus 0000:00: resource 8 [mem 0xfc800000-0xfe7fffff window] Jul 2 11:10:15.571096 kernel: pci_bus 0000:01: resource 1 [mem 0x95100000-0x952fffff] Jul 2 11:10:15.571137 kernel: pci_bus 0000:01: resource 2 [mem 0x90000000-0x93ffffff 64bit pref] Jul 2 11:10:15.571183 kernel: pci_bus 0000:03: resource 0 [io 0x5000-0x5fff] Jul 2 11:10:15.571225 kernel: pci_bus 0000:03: resource 1 [mem 0x95400000-0x954fffff] Jul 2 11:10:15.571270 kernel: pci_bus 0000:04: resource 0 [io 0x4000-0x4fff] Jul 2 11:10:15.571354 kernel: pci_bus 0000:04: resource 1 [mem 0x95300000-0x953fffff] Jul 2 11:10:15.571397 kernel: pci_bus 0000:06: resource 0 [io 0x3000-0x3fff] Jul 2 11:10:15.571436 kernel: pci_bus 0000:06: resource 1 [mem 0x94000000-0x950fffff] Jul 2 11:10:15.571478 kernel: pci_bus 0000:07: resource 0 [io 0x3000-0x3fff] Jul 2 11:10:15.571520 kernel: pci_bus 0000:07: resource 1 [mem 0x94000000-0x950fffff] Jul 2 11:10:15.571528 kernel: PCI: CLS 64 bytes, default 64 Jul 2 11:10:15.571534 kernel: DMAR: No ATSR found Jul 2 11:10:15.571539 kernel: DMAR: No SATC found Jul 2 11:10:15.571545 kernel: DMAR: dmar0: Using Queued invalidation Jul 2 11:10:15.571588 kernel: pci 0000:00:00.0: Adding to iommu group 0 Jul 2 11:10:15.571632 kernel: pci 0000:00:01.0: Adding to iommu group 1 Jul 2 11:10:15.571676 kernel: pci 0000:00:08.0: Adding to iommu group 2 Jul 2 11:10:15.571718 kernel: pci 0000:00:12.0: Adding to iommu group 3 Jul 2 11:10:15.571764 kernel: pci 0000:00:14.0: Adding to iommu group 4 Jul 2 11:10:15.571806 kernel: pci 0000:00:14.2: Adding to iommu group 4 Jul 2 11:10:15.571847 kernel: pci 0000:00:15.0: Adding to iommu group 5 Jul 2 11:10:15.571889 kernel: pci 0000:00:15.1: Adding to iommu group 5 Jul 2 11:10:15.571931 kernel: pci 0000:00:16.0: Adding to iommu group 6 Jul 2 11:10:15.571973 kernel: pci 0000:00:16.1: Adding to iommu group 6 Jul 2 11:10:15.572015 kernel: pci 0000:00:16.4: Adding to iommu group 6 Jul 2 11:10:15.572057 kernel: pci 0000:00:17.0: Adding to iommu group 7 Jul 2 11:10:15.572100 kernel: pci 0000:00:1b.0: Adding to iommu group 8 Jul 2 11:10:15.572143 kernel: pci 0000:00:1b.4: Adding to iommu group 9 Jul 2 11:10:15.572187 kernel: pci 0000:00:1b.5: Adding to iommu group 10 Jul 2 11:10:15.572229 kernel: pci 0000:00:1c.0: Adding to iommu group 11 Jul 2 11:10:15.572295 kernel: pci 0000:00:1c.3: Adding to iommu group 12 Jul 2 11:10:15.572357 kernel: pci 0000:00:1e.0: Adding to iommu group 13 Jul 2 11:10:15.572401 kernel: pci 0000:00:1f.0: Adding to iommu group 14 Jul 2 11:10:15.572443 kernel: pci 0000:00:1f.4: Adding to iommu group 14 Jul 2 11:10:15.572485 kernel: pci 0000:00:1f.5: Adding to iommu group 14 Jul 2 11:10:15.572531 kernel: pci 0000:01:00.0: Adding to iommu group 1 Jul 2 11:10:15.572574 kernel: pci 0000:01:00.1: Adding to iommu group 1 Jul 2 11:10:15.572619 kernel: pci 0000:03:00.0: Adding to iommu group 15 Jul 2 11:10:15.572663 kernel: pci 0000:04:00.0: Adding to iommu group 16 Jul 2 11:10:15.572707 kernel: pci 0000:06:00.0: Adding to iommu group 17 Jul 2 11:10:15.572753 kernel: pci 0000:07:00.0: Adding to iommu group 17 Jul 2 11:10:15.572760 kernel: DMAR: Intel(R) Virtualization Technology for Directed I/O Jul 2 11:10:15.572766 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Jul 2 11:10:15.572773 kernel: software IO TLB: mapped [mem 0x0000000086fcd000-0x000000008afcd000] (64MB) Jul 2 11:10:15.572778 kernel: RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 655360 ms ovfl timer Jul 2 11:10:15.572784 kernel: RAPL PMU: hw unit of domain pp0-core 2^-14 Joules Jul 2 11:10:15.572789 kernel: RAPL PMU: hw unit of domain package 2^-14 Joules Jul 2 11:10:15.572794 kernel: RAPL PMU: hw unit of domain dram 2^-14 Joules Jul 2 11:10:15.572841 kernel: platform rtc_cmos: registered platform RTC device (no PNP device found) Jul 2 11:10:15.572849 kernel: Initialise system trusted keyrings Jul 2 11:10:15.572854 kernel: workingset: timestamp_bits=39 max_order=23 bucket_order=0 Jul 2 11:10:15.572860 kernel: Key type asymmetric registered Jul 2 11:10:15.572866 kernel: Asymmetric key parser 'x509' registered Jul 2 11:10:15.572871 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 11:10:15.572877 kernel: io scheduler mq-deadline registered Jul 2 11:10:15.572882 kernel: io scheduler kyber registered Jul 2 11:10:15.572887 kernel: io scheduler bfq registered Jul 2 11:10:15.572930 kernel: pcieport 0000:00:01.0: PME: Signaling with IRQ 121 Jul 2 11:10:15.572972 kernel: pcieport 0000:00:1b.0: PME: Signaling with IRQ 122 Jul 2 11:10:15.573016 kernel: pcieport 0000:00:1b.4: PME: Signaling with IRQ 123 Jul 2 11:10:15.573061 kernel: pcieport 0000:00:1b.5: PME: Signaling with IRQ 124 Jul 2 11:10:15.573103 kernel: pcieport 0000:00:1c.0: PME: Signaling with IRQ 125 Jul 2 11:10:15.573145 kernel: pcieport 0000:00:1c.3: PME: Signaling with IRQ 126 Jul 2 11:10:15.573192 kernel: thermal LNXTHERM:00: registered as thermal_zone0 Jul 2 11:10:15.573200 kernel: ACPI: thermal: Thermal Zone [TZ00] (28 C) Jul 2 11:10:15.573206 kernel: ERST: Error Record Serialization Table (ERST) support is initialized. Jul 2 11:10:15.573211 kernel: pstore: Registered erst as persistent store backend Jul 2 11:10:15.573218 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Jul 2 11:10:15.573223 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 11:10:15.573229 kernel: 00:02: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Jul 2 11:10:15.573234 kernel: 00:03: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Jul 2 11:10:15.573239 kernel: hpet_acpi_add: no address or irqs in _CRS Jul 2 11:10:15.573303 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x1B, rev-id 16) Jul 2 11:10:15.573331 kernel: i8042: PNP: No PS/2 controller found. Jul 2 11:10:15.573370 kernel: rtc_cmos rtc_cmos: RTC can wake from S4 Jul 2 11:10:15.573411 kernel: rtc_cmos rtc_cmos: registered as rtc0 Jul 2 11:10:15.573451 kernel: rtc_cmos rtc_cmos: setting system clock to 2024-07-02T11:10:14 UTC (1719918614) Jul 2 11:10:15.573490 kernel: rtc_cmos rtc_cmos: alarms up to one month, y3k, 114 bytes nvram Jul 2 11:10:15.573497 kernel: fail to initialize ptp_kvm Jul 2 11:10:15.573503 kernel: intel_pstate: Intel P-state driver initializing Jul 2 11:10:15.573508 kernel: intel_pstate: Disabling energy efficiency optimization Jul 2 11:10:15.573513 kernel: intel_pstate: HWP enabled Jul 2 11:10:15.573519 kernel: vesafb: mode is 1024x768x8, linelength=1024, pages=0 Jul 2 11:10:15.573524 kernel: vesafb: scrolling: redraw Jul 2 11:10:15.573531 kernel: vesafb: Pseudocolor: size=0:8:8:8, shift=0:0:0:0 Jul 2 11:10:15.573536 kernel: vesafb: framebuffer at 0x94000000, mapped to 0x00000000c7258e17, using 768k, total 768k Jul 2 11:10:15.573541 kernel: Console: switching to colour frame buffer device 128x48 Jul 2 11:10:15.573547 kernel: fb0: VESA VGA frame buffer device Jul 2 11:10:15.573552 kernel: NET: Registered PF_INET6 protocol family Jul 2 11:10:15.573557 kernel: Segment Routing with IPv6 Jul 2 11:10:15.573563 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 11:10:15.573568 kernel: NET: Registered PF_PACKET protocol family Jul 2 11:10:15.573574 kernel: Key type dns_resolver registered Jul 2 11:10:15.573580 kernel: microcode: sig=0x906ed, pf=0x2, revision=0xf4 Jul 2 11:10:15.573585 kernel: microcode: Microcode Update Driver: v2.2. Jul 2 11:10:15.573590 kernel: IPI shorthand broadcast: enabled Jul 2 11:10:15.573595 kernel: sched_clock: Marking stable (1683981492, 1339769828)->(4465147485, -1441396165) Jul 2 11:10:15.573601 kernel: registered taskstats version 1 Jul 2 11:10:15.573606 kernel: Loading compiled-in X.509 certificates Jul 2 11:10:15.573612 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: a1ce693884775675566f1ed116e36d15950b9a42' Jul 2 11:10:15.573617 kernel: Key type .fscrypt registered Jul 2 11:10:15.573622 kernel: Key type fscrypt-provisioning registered Jul 2 11:10:15.573628 kernel: pstore: Using crash dump compression: deflate Jul 2 11:10:15.573634 kernel: ima: Allocated hash algorithm: sha1 Jul 2 11:10:15.573639 kernel: ima: No architecture policies found Jul 2 11:10:15.573644 kernel: clk: Disabling unused clocks Jul 2 11:10:15.573650 kernel: Freeing unused kernel image (initmem) memory: 47444K Jul 2 11:10:15.573655 kernel: Write protecting the kernel read-only data: 28672k Jul 2 11:10:15.573660 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Jul 2 11:10:15.573666 kernel: Freeing unused kernel image (rodata/data gap) memory: 624K Jul 2 11:10:15.573671 kernel: Run /init as init process Jul 2 11:10:15.573677 kernel: with arguments: Jul 2 11:10:15.573682 kernel: /init Jul 2 11:10:15.573688 kernel: with environment: Jul 2 11:10:15.573693 kernel: HOME=/ Jul 2 11:10:15.573698 kernel: TERM=linux Jul 2 11:10:15.573703 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 11:10:15.573710 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 11:10:15.573716 systemd[1]: Detected architecture x86-64. Jul 2 11:10:15.573723 systemd[1]: Running in initrd. Jul 2 11:10:15.573728 systemd[1]: No hostname configured, using default hostname. Jul 2 11:10:15.573734 systemd[1]: Hostname set to . Jul 2 11:10:15.573739 systemd[1]: Initializing machine ID from random generator. Jul 2 11:10:15.573745 systemd[1]: Queued start job for default target initrd.target. Jul 2 11:10:15.573750 systemd[1]: Started systemd-ask-password-console.path. Jul 2 11:10:15.573756 systemd[1]: Reached target cryptsetup.target. Jul 2 11:10:15.573761 systemd[1]: Reached target paths.target. Jul 2 11:10:15.573767 systemd[1]: Reached target slices.target. Jul 2 11:10:15.573773 systemd[1]: Reached target swap.target. Jul 2 11:10:15.573778 systemd[1]: Reached target timers.target. Jul 2 11:10:15.573783 systemd[1]: Listening on iscsid.socket. Jul 2 11:10:15.573789 systemd[1]: Listening on iscsiuio.socket. Jul 2 11:10:15.573794 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 11:10:15.573800 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 11:10:15.573806 systemd[1]: Listening on systemd-journald.socket. Jul 2 11:10:15.573812 kernel: tsc: Refined TSC clocksource calibration: 3407.999 MHz Jul 2 11:10:15.573817 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd336761, max_idle_ns: 440795243819 ns Jul 2 11:10:15.573823 kernel: clocksource: Switched to clocksource tsc Jul 2 11:10:15.573828 systemd[1]: Listening on systemd-networkd.socket. Jul 2 11:10:15.573834 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 11:10:15.573839 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 11:10:15.573845 systemd[1]: Reached target sockets.target. Jul 2 11:10:15.573850 systemd[1]: Starting kmod-static-nodes.service... Jul 2 11:10:15.573857 systemd[1]: Finished network-cleanup.service. Jul 2 11:10:15.573862 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 11:10:15.573868 systemd[1]: Starting systemd-journald.service... Jul 2 11:10:15.573873 systemd[1]: Starting systemd-modules-load.service... Jul 2 11:10:15.573881 systemd-journald[267]: Journal started Jul 2 11:10:15.573907 systemd-journald[267]: Runtime Journal (/run/log/journal/e3031f495c0d4602bba70a7478df29ec) is 8.0M, max 640.1M, 632.1M free. Jul 2 11:10:15.575657 systemd-modules-load[268]: Inserted module 'overlay' Jul 2 11:10:15.582000 audit: BPF prog-id=6 op=LOAD Jul 2 11:10:15.600333 kernel: audit: type=1334 audit(1719918615.582:2): prog-id=6 op=LOAD Jul 2 11:10:15.600351 systemd[1]: Starting systemd-resolved.service... Jul 2 11:10:15.649286 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 11:10:15.649303 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 11:10:15.683319 kernel: Bridge firewalling registered Jul 2 11:10:15.683349 systemd[1]: Started systemd-journald.service. Jul 2 11:10:15.697521 systemd-modules-load[268]: Inserted module 'br_netfilter' Jul 2 11:10:15.746579 kernel: audit: type=1130 audit(1719918615.705:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:15.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:15.700013 systemd-resolved[270]: Positive Trust Anchors: Jul 2 11:10:15.809317 kernel: SCSI subsystem initialized Jul 2 11:10:15.809328 kernel: audit: type=1130 audit(1719918615.758:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:15.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:15.700020 systemd-resolved[270]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 11:10:15.925362 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 11:10:15.925376 kernel: audit: type=1130 audit(1719918615.829:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:15.925384 kernel: device-mapper: uevent: version 1.0.3 Jul 2 11:10:15.925391 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 11:10:15.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:15.700039 systemd-resolved[270]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 11:10:15.998511 kernel: audit: type=1130 audit(1719918615.933:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:15.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:15.701595 systemd-resolved[270]: Defaulting to hostname 'linux'. Jul 2 11:10:16.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:15.705505 systemd[1]: Started systemd-resolved.service. Jul 2 11:10:16.106513 kernel: audit: type=1130 audit(1719918616.007:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:16.106524 kernel: audit: type=1130 audit(1719918616.060:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:16.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:15.758451 systemd[1]: Finished kmod-static-nodes.service. Jul 2 11:10:15.829434 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 11:10:15.927880 systemd-modules-load[268]: Inserted module 'dm_multipath' Jul 2 11:10:15.933567 systemd[1]: Finished systemd-modules-load.service. Jul 2 11:10:16.007615 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 11:10:16.060564 systemd[1]: Reached target nss-lookup.target. Jul 2 11:10:16.115870 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 11:10:16.135785 systemd[1]: Starting systemd-sysctl.service... Jul 2 11:10:16.136081 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 11:10:16.138920 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 11:10:16.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:16.139628 systemd[1]: Finished systemd-sysctl.service. Jul 2 11:10:16.188371 kernel: audit: type=1130 audit(1719918616.138:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:16.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:16.201610 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 11:10:16.266380 kernel: audit: type=1130 audit(1719918616.201:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:16.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:16.258879 systemd[1]: Starting dracut-cmdline.service... Jul 2 11:10:16.280387 dracut-cmdline[294]: dracut-dracut-053 Jul 2 11:10:16.280387 dracut-cmdline[294]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Jul 2 11:10:16.280387 dracut-cmdline[294]: BEL=ROOT console=tty0 console=ttyS1,115200n8 flatcar.first_boot=detected flatcar.oem.id=packet flatcar.autologin verity.usrhash=d29251fe942de56b08103b03939b6e5af4108e76dc6080fe2498c5db43f16e82 Jul 2 11:10:16.351304 kernel: Loading iSCSI transport class v2.0-870. Jul 2 11:10:16.351317 kernel: iscsi: registered transport (tcp) Jul 2 11:10:16.405906 kernel: iscsi: registered transport (qla4xxx) Jul 2 11:10:16.405922 kernel: QLogic iSCSI HBA Driver Jul 2 11:10:16.421660 systemd[1]: Finished dracut-cmdline.service. Jul 2 11:10:16.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:16.430958 systemd[1]: Starting dracut-pre-udev.service... Jul 2 11:10:16.486341 kernel: raid6: avx2x4 gen() 48955 MB/s Jul 2 11:10:16.521298 kernel: raid6: avx2x4 xor() 21636 MB/s Jul 2 11:10:16.556340 kernel: raid6: avx2x2 gen() 53863 MB/s Jul 2 11:10:16.591340 kernel: raid6: avx2x2 xor() 31974 MB/s Jul 2 11:10:16.626339 kernel: raid6: avx2x1 gen() 45250 MB/s Jul 2 11:10:16.660330 kernel: raid6: avx2x1 xor() 27864 MB/s Jul 2 11:10:16.694297 kernel: raid6: sse2x4 gen() 21367 MB/s Jul 2 11:10:16.728339 kernel: raid6: sse2x4 xor() 11997 MB/s Jul 2 11:10:16.762299 kernel: raid6: sse2x2 gen() 21672 MB/s Jul 2 11:10:16.796298 kernel: raid6: sse2x2 xor() 13435 MB/s Jul 2 11:10:16.830301 kernel: raid6: sse2x1 gen() 18326 MB/s Jul 2 11:10:16.882279 kernel: raid6: sse2x1 xor() 8938 MB/s Jul 2 11:10:16.882295 kernel: raid6: using algorithm avx2x2 gen() 53863 MB/s Jul 2 11:10:16.882303 kernel: raid6: .... xor() 31974 MB/s, rmw enabled Jul 2 11:10:16.900531 kernel: raid6: using avx2x2 recovery algorithm Jul 2 11:10:16.947303 kernel: xor: automatically using best checksumming function avx Jul 2 11:10:17.026322 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Jul 2 11:10:17.030915 systemd[1]: Finished dracut-pre-udev.service. Jul 2 11:10:17.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:17.040000 audit: BPF prog-id=7 op=LOAD Jul 2 11:10:17.040000 audit: BPF prog-id=8 op=LOAD Jul 2 11:10:17.041262 systemd[1]: Starting systemd-udevd.service... Jul 2 11:10:17.049395 systemd-udevd[474]: Using default interface naming scheme 'v252'. Jul 2 11:10:17.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:17.054428 systemd[1]: Started systemd-udevd.service. Jul 2 11:10:17.096395 dracut-pre-trigger[485]: rd.md=0: removing MD RAID activation Jul 2 11:10:17.071908 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 11:10:17.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:17.100489 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 11:10:17.115335 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 11:10:17.168929 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 11:10:17.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:17.199280 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 11:10:17.201271 kernel: libata version 3.00 loaded. Jul 2 11:10:17.221272 kernel: ACPI: bus type USB registered Jul 2 11:10:17.221305 kernel: usbcore: registered new interface driver usbfs Jul 2 11:10:17.221315 kernel: usbcore: registered new interface driver hub Jul 2 11:10:17.221324 kernel: usbcore: registered new device driver usb Jul 2 11:10:17.297274 kernel: AVX2 version of gcm_enc/dec engaged. Jul 2 11:10:17.297311 kernel: ahci 0000:00:17.0: version 3.0 Jul 2 11:10:17.297415 kernel: AES CTR mode by8 optimization enabled Jul 2 11:10:17.313728 kernel: ahci 0000:00:17.0: AHCI 0001.0301 32 slots 7 ports 6 Gbps 0x7f impl SATA mode Jul 2 11:10:17.354551 kernel: ahci 0000:00:17.0: flags: 64bit ncq sntf clo only pio slum part ems deso sadm sds apst Jul 2 11:10:17.387668 kernel: igb: Intel(R) Gigabit Ethernet Network Driver Jul 2 11:10:17.387689 kernel: scsi host0: ahci Jul 2 11:10:17.387776 kernel: igb: Copyright (c) 2007-2014 Intel Corporation. Jul 2 11:10:17.387790 kernel: scsi host1: ahci Jul 2 11:10:17.433925 kernel: mlx5_core 0000:01:00.0: firmware version: 14.29.2002 Jul 2 11:10:17.434017 kernel: scsi host2: ahci Jul 2 11:10:17.434039 kernel: mlx5_core 0000:01:00.0: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Jul 2 11:10:17.447266 kernel: scsi host3: ahci Jul 2 11:10:17.452272 kernel: pps pps0: new PPS source ptp0 Jul 2 11:10:17.452360 kernel: igb 0000:03:00.0: added PHC on eth0 Jul 2 11:10:17.452433 kernel: igb 0000:03:00.0: Intel(R) Gigabit Ethernet Network Connection Jul 2 11:10:17.452499 kernel: igb 0000:03:00.0: eth0: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6d:98:82 Jul 2 11:10:17.452562 kernel: igb 0000:03:00.0: eth0: PBA No: 010000-000 Jul 2 11:10:17.452626 kernel: igb 0000:03:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Jul 2 11:10:17.506929 kernel: pps pps1: new PPS source ptp1 Jul 2 11:10:17.507008 kernel: scsi host4: ahci Jul 2 11:10:17.507045 kernel: igb 0000:04:00.0: added PHC on eth1 Jul 2 11:10:17.553575 kernel: scsi host5: ahci Jul 2 11:10:17.553817 kernel: igb 0000:04:00.0: Intel(R) Gigabit Ethernet Network Connection Jul 2 11:10:17.553933 kernel: scsi host6: ahci Jul 2 11:10:17.554267 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Jul 2 11:10:17.554385 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 1 Jul 2 11:10:17.556311 kernel: xhci_hcd 0000:00:14.0: hcc params 0x200077c1 hci version 0x110 quirks 0x0000000000009810 Jul 2 11:10:17.556400 kernel: xhci_hcd 0000:00:14.0: xHCI Host Controller Jul 2 11:10:17.556454 kernel: xhci_hcd 0000:00:14.0: new USB bus registered, assigned bus number 2 Jul 2 11:10:17.556504 kernel: xhci_hcd 0000:00:14.0: Host supports USB 3.1 Enhanced SuperSpeed Jul 2 11:10:17.556552 kernel: hub 1-0:1.0: USB hub found Jul 2 11:10:17.556645 kernel: hub 1-0:1.0: 16 ports detected Jul 2 11:10:17.557308 kernel: hub 2-0:1.0: USB hub found Jul 2 11:10:17.557430 kernel: hub 2-0:1.0: 10 ports detected Jul 2 11:10:17.569846 kernel: igb 0000:04:00.0: eth1: (PCIe:2.5Gb/s:Width x1) 3c:ec:ef:6d:98:83 Jul 2 11:10:17.581888 kernel: igb 0000:04:00.0: eth1: PBA No: 010000-000 Jul 2 11:10:17.582268 kernel: ata1: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516100 irq 127 Jul 2 11:10:17.593271 kernel: igb 0000:04:00.0: Using MSI-X interrupts. 4 rx queue(s), 4 tx queue(s) Jul 2 11:10:17.638522 kernel: igb 0000:03:00.0 eno1: renamed from eth0 Jul 2 11:10:17.638702 kernel: ata2: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516180 irq 127 Jul 2 11:10:17.726518 kernel: mlx5_core 0000:01:00.0: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Jul 2 11:10:17.726686 kernel: ata3: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516200 irq 127 Jul 2 11:10:17.820915 kernel: usb 1-14: new high-speed USB device number 2 using xhci_hcd Jul 2 11:10:17.820968 kernel: ata4: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516280 irq 127 Jul 2 11:10:17.953364 kernel: ata5: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516300 irq 127 Jul 2 11:10:17.953376 kernel: hub 1-14:1.0: USB hub found Jul 2 11:10:17.953458 kernel: ata6: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516380 irq 127 Jul 2 11:10:17.983962 kernel: hub 1-14:1.0: 4 ports detected Jul 2 11:10:17.984051 kernel: ata7: SATA max UDMA/133 abar m2048@0x95516000 port 0x95516400 irq 127 Jul 2 11:10:18.038344 kernel: igb 0000:04:00.0 eno2: renamed from eth1 Jul 2 11:10:18.076269 kernel: mlx5_core 0000:01:00.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Jul 2 11:10:18.294360 kernel: mlx5_core 0000:01:00.0: Supported tc offload range - chains: 4294967294, prios: 4294967295 Jul 2 11:10:18.294813 kernel: usb 1-14.1: new low-speed USB device number 3 using xhci_hcd Jul 2 11:10:18.319284 kernel: mlx5_core 0000:01:00.1: firmware version: 14.29.2002 Jul 2 11:10:18.335298 kernel: ata1: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Jul 2 11:10:18.335316 kernel: mlx5_core 0000:01:00.1: 63.008 Gb/s available PCIe bandwidth (8.0 GT/s PCIe x8 link) Jul 2 11:10:18.352270 kernel: ata6: SATA link down (SStatus 0 SControl 300) Jul 2 11:10:18.387302 kernel: ata2: SATA link up 6.0 Gbps (SStatus 133 SControl 300) Jul 2 11:10:18.404268 kernel: ata4: SATA link down (SStatus 0 SControl 300) Jul 2 11:10:18.419298 kernel: ata5: SATA link down (SStatus 0 SControl 300) Jul 2 11:10:18.435268 kernel: ata3: SATA link down (SStatus 0 SControl 300) Jul 2 11:10:18.450266 kernel: ata7: SATA link down (SStatus 0 SControl 300) Jul 2 11:10:18.450283 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 11:10:18.465267 kernel: ata1.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Jul 2 11:10:18.497267 kernel: ata2.00: ATA-11: Micron_5300_MTFDDAK480TDT, D3MU001, max UDMA/133 Jul 2 11:10:18.547892 kernel: ata1.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Jul 2 11:10:18.547907 kernel: ata1.00: Features: NCQ-prio Jul 2 11:10:18.548323 kernel: ata2.00: 937703088 sectors, multi 16: LBA48 NCQ (depth 32), AA Jul 2 11:10:18.578472 kernel: ata2.00: Features: NCQ-prio Jul 2 11:10:18.597315 kernel: ata1.00: configured for UDMA/133 Jul 2 11:10:18.597331 kernel: ata2.00: configured for UDMA/133 Jul 2 11:10:18.597343 kernel: scsi 0:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Jul 2 11:10:18.629301 kernel: scsi 1:0:0:0: Direct-Access ATA Micron_5300_MTFD U001 PQ: 0 ANSI: 5 Jul 2 11:10:18.647299 kernel: mlx5_core 0000:01:00.1: E-Switch: Total vports 10, per vport: max uc(1024) max mc(16384) Jul 2 11:10:18.699982 kernel: usbcore: registered new interface driver usbhid Jul 2 11:10:18.700044 kernel: port_module: 9 callbacks suppressed Jul 2 11:10:18.700053 kernel: mlx5_core 0000:01:00.1: Port module event: module 1, Cable plugged Jul 2 11:10:18.700125 kernel: usbhid: USB HID core driver Jul 2 11:10:18.717305 kernel: mlx5_core 0000:01:00.1: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Jul 2 11:10:18.750270 kernel: ata1.00: Enabling discard_zeroes_data Jul 2 11:10:18.765220 kernel: ata2.00: Enabling discard_zeroes_data Jul 2 11:10:18.780360 kernel: sd 0:0:0:0: [sda] 937703088 512-byte logical blocks: (480 GB/447 GiB) Jul 2 11:10:18.780498 kernel: sd 1:0:0:0: [sdb] 937703088 512-byte logical blocks: (480 GB/447 GiB) Jul 2 11:10:18.815816 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Jul 2 11:10:18.815892 kernel: sd 1:0:0:0: [sdb] 4096-byte physical blocks Jul 2 11:10:18.815952 kernel: sd 1:0:0:0: [sdb] Write Protect is off Jul 2 11:10:18.831041 kernel: sd 0:0:0:0: [sda] Write Protect is off Jul 2 11:10:18.846030 kernel: sd 1:0:0:0: [sdb] Mode Sense: 00 3a 00 00 Jul 2 11:10:18.846132 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.0/0003:0557:2419.0001/input/input0 Jul 2 11:10:18.860468 kernel: sd 0:0:0:0: [sda] Mode Sense: 00 3a 00 00 Jul 2 11:10:18.874691 kernel: sd 1:0:0:0: [sdb] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Jul 2 11:10:18.898339 kernel: hid-generic 0003:0557:2419.0001: input,hidraw0: USB HID v1.00 Keyboard [HID 0557:2419] on usb-0000:00:14.0-14.1/input0 Jul 2 11:10:18.898423 kernel: input: HID 0557:2419 as /devices/pci0000:00/0000:00:14.0/usb1/1-14/1-14.1/1-14.1:1.1/0003:0557:2419.0002/input/input1 Jul 2 11:10:18.898434 kernel: hid-generic 0003:0557:2419.0002: input,hidraw1: USB HID v1.00 Mouse [HID 0557:2419] on usb-0000:00:14.0-14.1/input1 Jul 2 11:10:18.924555 kernel: sd 0:0:0:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA Jul 2 11:10:18.942320 kernel: ata2.00: Enabling discard_zeroes_data Jul 2 11:10:18.942336 kernel: mlx5_core 0000:01:00.1: Supported tc offload range - chains: 4294967294, prios: 4294967295 Jul 2 11:10:19.095953 kernel: ata1.00: Enabling discard_zeroes_data Jul 2 11:10:19.111803 kernel: ata2.00: Enabling discard_zeroes_data Jul 2 11:10:19.111818 kernel: sd 1:0:0:0: [sdb] Attached SCSI disk Jul 2 11:10:19.128306 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 11:10:19.159950 kernel: GPT:9289727 != 937703087 Jul 2 11:10:19.159968 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 11:10:19.176761 kernel: GPT:9289727 != 937703087 Jul 2 11:10:19.191063 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 11:10:19.207145 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 11:10:19.239152 kernel: ata1.00: Enabling discard_zeroes_data Jul 2 11:10:19.239168 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Jul 2 11:10:19.275300 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: renamed from eth0 Jul 2 11:10:19.301331 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by (udev-worker) (528) Jul 2 11:10:19.301336 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 11:10:19.333463 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: renamed from eth1 Jul 2 11:10:19.318383 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 11:10:19.348912 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 11:10:19.366398 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 11:10:19.392497 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 11:10:19.403431 systemd[1]: Starting disk-uuid.service... Jul 2 11:10:19.455349 kernel: ata1.00: Enabling discard_zeroes_data Jul 2 11:10:19.455367 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 11:10:19.455375 kernel: ata1.00: Enabling discard_zeroes_data Jul 2 11:10:19.455428 disk-uuid[687]: Primary Header is updated. Jul 2 11:10:19.455428 disk-uuid[687]: Secondary Entries is updated. Jul 2 11:10:19.455428 disk-uuid[687]: Secondary Header is updated. Jul 2 11:10:19.512340 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 11:10:19.512351 kernel: ata1.00: Enabling discard_zeroes_data Jul 2 11:10:19.512361 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 11:10:20.498755 kernel: ata1.00: Enabling discard_zeroes_data Jul 2 11:10:20.518045 disk-uuid[688]: The operation has completed successfully. Jul 2 11:10:20.526476 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Jul 2 11:10:20.558120 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 11:10:20.655623 kernel: audit: type=1130 audit(1719918620.566:19): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:20.655638 kernel: audit: type=1131 audit(1719918620.566:20): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:20.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:20.566000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:20.558175 systemd[1]: Finished disk-uuid.service. Jul 2 11:10:20.685308 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Jul 2 11:10:20.570430 systemd[1]: Starting verity-setup.service... Jul 2 11:10:20.717320 systemd[1]: Found device dev-mapper-usr.device. Jul 2 11:10:20.727262 systemd[1]: Mounting sysusr-usr.mount... Jul 2 11:10:20.741522 systemd[1]: Finished verity-setup.service. Jul 2 11:10:20.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:20.802270 kernel: audit: type=1130 audit(1719918620.756:21): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:20.830439 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 11:10:20.830310 systemd[1]: Mounted sysusr-usr.mount. Jul 2 11:10:20.837559 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 11:10:20.837959 systemd[1]: Starting ignition-setup.service... Jul 2 11:10:20.934358 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 11:10:20.934371 kernel: BTRFS info (device sda6): using free space tree Jul 2 11:10:20.934379 kernel: BTRFS info (device sda6): has skinny extents Jul 2 11:10:20.934387 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 11:10:20.927204 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 11:10:20.942650 systemd[1]: Finished ignition-setup.service. Jul 2 11:10:21.007309 kernel: audit: type=1130 audit(1719918620.959:22): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:20.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:20.959837 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 11:10:21.015485 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 11:10:21.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:21.081000 audit: BPF prog-id=9 op=LOAD Jul 2 11:10:21.081877 systemd[1]: Starting systemd-networkd.service... Jul 2 11:10:21.117387 kernel: audit: type=1130 audit(1719918621.031:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:21.117403 kernel: audit: type=1334 audit(1719918621.081:24): prog-id=9 op=LOAD Jul 2 11:10:21.105480 ignition[864]: Ignition 2.14.0 Jul 2 11:10:21.105485 ignition[864]: Stage: fetch-offline Jul 2 11:10:21.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:21.117572 unknown[864]: fetched base config from "system" Jul 2 11:10:21.236468 kernel: audit: type=1130 audit(1719918621.131:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:21.236481 kernel: audit: type=1130 audit(1719918621.188:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:21.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:21.105511 ignition[864]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 11:10:21.117575 unknown[864]: fetched user config from "system" Jul 2 11:10:21.105524 ignition[864]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Jul 2 11:10:21.118238 systemd-networkd[879]: lo: Link UP Jul 2 11:10:21.113469 ignition[864]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 11:10:21.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:21.118240 systemd-networkd[879]: lo: Gained carrier Jul 2 11:10:21.350483 kernel: audit: type=1130 audit(1719918621.288:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:21.113534 ignition[864]: parsed url from cmdline: "" Jul 2 11:10:21.118475 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 11:10:21.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:21.365526 iscsid[900]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 11:10:21.365526 iscsid[900]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Jul 2 11:10:21.365526 iscsid[900]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 11:10:21.365526 iscsid[900]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 11:10:21.365526 iscsid[900]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 11:10:21.365526 iscsid[900]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 11:10:21.365526 iscsid[900]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 11:10:21.541522 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Jul 2 11:10:21.541613 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f1np1: link becomes ready Jul 2 11:10:21.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:21.113536 ignition[864]: no config URL provided Jul 2 11:10:21.118576 systemd-networkd[879]: Enumeration completed Jul 2 11:10:21.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:21.113539 ignition[864]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 11:10:21.119405 systemd-networkd[879]: enp1s0f1np1: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 11:10:21.113561 ignition[864]: parsing config with SHA512: 9cc525f516bd2761ddf4936fb5875e0d054246a2fca796e4b379cf8a5426a44e5565dfd0b16d5c50ef32eed4eab517f4d7a14d2c42f4e9373c3a9bcf3e97be78 Jul 2 11:10:21.131416 systemd[1]: Started systemd-networkd.service. Jul 2 11:10:21.117833 ignition[864]: fetch-offline: fetch-offline passed Jul 2 11:10:21.188384 systemd[1]: Reached target network.target. Jul 2 11:10:21.117835 ignition[864]: POST message to Packet Timeline Jul 2 11:10:21.244342 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 2 11:10:21.117840 ignition[864]: POST Status error: resource requires networking Jul 2 11:10:21.244769 systemd[1]: Starting ignition-kargs.service... Jul 2 11:10:21.117879 ignition[864]: Ignition finished successfully Jul 2 11:10:21.260849 systemd[1]: Starting iscsiuio.service... Jul 2 11:10:21.249375 ignition[886]: Ignition 2.14.0 Jul 2 11:10:21.274449 systemd[1]: Started iscsiuio.service. Jul 2 11:10:21.249379 ignition[886]: Stage: kargs Jul 2 11:10:21.288959 systemd[1]: Starting iscsid.service... Jul 2 11:10:21.249437 ignition[886]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 11:10:21.343505 systemd[1]: Started iscsid.service. Jul 2 11:10:21.249448 ignition[886]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Jul 2 11:10:21.357872 systemd[1]: Starting dracut-initqueue.service... Jul 2 11:10:21.742422 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Jul 2 11:10:21.250755 ignition[886]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 11:10:21.372574 systemd[1]: Finished dracut-initqueue.service. Jul 2 11:10:21.252344 ignition[886]: kargs: kargs passed Jul 2 11:10:21.418645 systemd[1]: Reached target remote-fs-pre.target. Jul 2 11:10:21.252348 ignition[886]: POST message to Packet Timeline Jul 2 11:10:21.463489 systemd-networkd[879]: enp1s0f0np0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 11:10:21.252358 ignition[886]: GET https://metadata.packet.net/metadata: attempt #1 Jul 2 11:10:21.476373 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 11:10:21.254302 ignition[886]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:44228->[::1]:53: read: connection refused Jul 2 11:10:21.511471 systemd[1]: Reached target remote-fs.target. Jul 2 11:10:21.454808 ignition[886]: GET https://metadata.packet.net/metadata: attempt #2 Jul 2 11:10:21.530989 systemd[1]: Starting dracut-pre-mount.service... Jul 2 11:10:21.456161 ignition[886]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:48730->[::1]:53: read: connection refused Jul 2 11:10:21.548453 systemd[1]: Finished dracut-pre-mount.service. Jul 2 11:10:21.856944 ignition[886]: GET https://metadata.packet.net/metadata: attempt #3 Jul 2 11:10:21.735940 systemd-networkd[879]: eno2: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 11:10:21.858042 ignition[886]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:54877->[::1]:53: read: connection refused Jul 2 11:10:21.765110 systemd-networkd[879]: eno1: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 11:10:21.796297 systemd-networkd[879]: enp1s0f1np1: Link UP Jul 2 11:10:21.796758 systemd-networkd[879]: enp1s0f1np1: Gained carrier Jul 2 11:10:21.820861 systemd-networkd[879]: enp1s0f0np0: Link UP Jul 2 11:10:21.821240 systemd-networkd[879]: eno2: Link UP Jul 2 11:10:21.821619 systemd-networkd[879]: eno1: Link UP Jul 2 11:10:22.499868 systemd-networkd[879]: enp1s0f0np0: Gained carrier Jul 2 11:10:22.508502 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): enp1s0f0np0: link becomes ready Jul 2 11:10:22.535466 systemd-networkd[879]: enp1s0f0np0: DHCPv4 address 147.75.203.5/31, gateway 147.75.203.4 acquired from 145.40.83.140 Jul 2 11:10:22.658604 ignition[886]: GET https://metadata.packet.net/metadata: attempt #4 Jul 2 11:10:22.659757 ignition[886]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:49152->[::1]:53: read: connection refused Jul 2 11:10:22.798857 systemd-networkd[879]: enp1s0f1np1: Gained IPv6LL Jul 2 11:10:23.630861 systemd-networkd[879]: enp1s0f0np0: Gained IPv6LL Jul 2 11:10:24.261648 ignition[886]: GET https://metadata.packet.net/metadata: attempt #5 Jul 2 11:10:24.263260 ignition[886]: GET error: Get "https://metadata.packet.net/metadata": dial tcp: lookup metadata.packet.net on [::1]:53: read udp [::1]:52648->[::1]:53: read: connection refused Jul 2 11:10:27.466238 ignition[886]: GET https://metadata.packet.net/metadata: attempt #6 Jul 2 11:10:27.511023 ignition[886]: GET result: OK Jul 2 11:10:27.691875 ignition[886]: Ignition finished successfully Jul 2 11:10:27.696400 systemd[1]: Finished ignition-kargs.service. Jul 2 11:10:27.777557 kernel: kauditd_printk_skb: 3 callbacks suppressed Jul 2 11:10:27.777591 kernel: audit: type=1130 audit(1719918627.707:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:27.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:27.716239 ignition[917]: Ignition 2.14.0 Jul 2 11:10:27.709546 systemd[1]: Starting ignition-disks.service... Jul 2 11:10:27.716242 ignition[917]: Stage: disks Jul 2 11:10:27.716300 ignition[917]: reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 11:10:27.716310 ignition[917]: parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Jul 2 11:10:27.718721 ignition[917]: no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 11:10:27.719290 ignition[917]: disks: disks passed Jul 2 11:10:27.719293 ignition[917]: POST message to Packet Timeline Jul 2 11:10:27.719302 ignition[917]: GET https://metadata.packet.net/metadata: attempt #1 Jul 2 11:10:27.743896 ignition[917]: GET result: OK Jul 2 11:10:27.920494 ignition[917]: Ignition finished successfully Jul 2 11:10:27.923817 systemd[1]: Finished ignition-disks.service. Jul 2 11:10:27.936000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:27.936807 systemd[1]: Reached target initrd-root-device.target. Jul 2 11:10:28.011535 kernel: audit: type=1130 audit(1719918627.936:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:27.997468 systemd[1]: Reached target local-fs-pre.target. Jul 2 11:10:27.997503 systemd[1]: Reached target local-fs.target. Jul 2 11:10:28.020489 systemd[1]: Reached target sysinit.target. Jul 2 11:10:28.034484 systemd[1]: Reached target basic.target. Jul 2 11:10:28.048230 systemd[1]: Starting systemd-fsck-root.service... Jul 2 11:10:28.067339 systemd-fsck[931]: ROOT: clean, 614/553520 files, 56020/553472 blocks Jul 2 11:10:28.080809 systemd[1]: Finished systemd-fsck-root.service. Jul 2 11:10:28.167693 kernel: audit: type=1130 audit(1719918628.089:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:28.167708 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 11:10:28.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:28.094971 systemd[1]: Mounting sysroot.mount... Jul 2 11:10:28.174901 systemd[1]: Mounted sysroot.mount. Jul 2 11:10:28.189602 systemd[1]: Reached target initrd-root-fs.target. Jul 2 11:10:28.198298 systemd[1]: Mounting sysroot-usr.mount... Jul 2 11:10:28.224164 systemd[1]: Starting flatcar-metadata-hostname.service... Jul 2 11:10:28.234313 systemd[1]: Starting flatcar-static-network.service... Jul 2 11:10:28.249463 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 11:10:28.249550 systemd[1]: Reached target ignition-diskful.target. Jul 2 11:10:28.269310 systemd[1]: Mounted sysroot-usr.mount. Jul 2 11:10:28.292958 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 11:10:28.362408 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (940) Jul 2 11:10:28.362427 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 11:10:28.305150 systemd[1]: Starting initrd-setup-root.service... Jul 2 11:10:28.436404 kernel: BTRFS info (device sda6): using free space tree Jul 2 11:10:28.436420 kernel: BTRFS info (device sda6): has skinny extents Jul 2 11:10:28.436428 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 11:10:28.436436 initrd-setup-root[947]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 11:10:28.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:28.498795 coreos-metadata[938]: Jul 02 11:10:28.386 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jul 2 11:10:28.498795 coreos-metadata[938]: Jul 02 11:10:28.409 INFO Fetch successful Jul 2 11:10:28.498795 coreos-metadata[938]: Jul 02 11:10:28.429 INFO wrote hostname ci-3510.3.5-a-18871bf0db to /sysroot/etc/hostname Jul 2 11:10:28.704538 kernel: audit: type=1130 audit(1719918628.444:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:28.704556 kernel: audit: type=1130 audit(1719918628.507:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:28.704565 kernel: audit: type=1130 audit(1719918628.570:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:28.704573 kernel: audit: type=1131 audit(1719918628.570:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:28.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:28.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:28.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-static-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:28.372783 systemd[1]: Finished initrd-setup-root.service. Jul 2 11:10:28.718545 coreos-metadata[939]: Jul 02 11:10:28.386 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jul 2 11:10:28.718545 coreos-metadata[939]: Jul 02 11:10:28.409 INFO Fetch successful Jul 2 11:10:28.746331 initrd-setup-root[957]: cut: /sysroot/etc/group: No such file or directory Jul 2 11:10:28.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:28.445819 systemd[1]: Finished flatcar-metadata-hostname.service. Jul 2 11:10:28.819511 kernel: audit: type=1130 audit(1719918628.754:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:28.819544 initrd-setup-root[965]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 11:10:28.507600 systemd[1]: flatcar-static-network.service: Deactivated successfully. Jul 2 11:10:28.839471 initrd-setup-root[973]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 11:10:28.507639 systemd[1]: Finished flatcar-static-network.service. Jul 2 11:10:28.858548 ignition[1012]: INFO : Ignition 2.14.0 Jul 2 11:10:28.858548 ignition[1012]: INFO : Stage: mount Jul 2 11:10:28.858548 ignition[1012]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 11:10:28.858548 ignition[1012]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Jul 2 11:10:28.858548 ignition[1012]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 11:10:28.858548 ignition[1012]: INFO : mount: mount passed Jul 2 11:10:28.858548 ignition[1012]: INFO : POST message to Packet Timeline Jul 2 11:10:28.858548 ignition[1012]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Jul 2 11:10:28.858548 ignition[1012]: INFO : GET result: OK Jul 2 11:10:28.570558 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 11:10:28.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:29.014025 ignition[1012]: INFO : Ignition finished successfully Jul 2 11:10:29.029501 kernel: audit: type=1130 audit(1719918628.957:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:28.691861 systemd[1]: Starting ignition-mount.service... Jul 2 11:10:28.711843 systemd[1]: Starting sysroot-boot.service... Jul 2 11:10:29.123365 kernel: BTRFS: device label OEM devid 1 transid 17 /dev/sda6 scanned by mount (1028) Jul 2 11:10:29.123377 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Jul 2 11:10:29.123384 kernel: BTRFS info (device sda6): using free space tree Jul 2 11:10:29.123391 kernel: BTRFS info (device sda6): has skinny extents Jul 2 11:10:29.123398 kernel: BTRFS info (device sda6): enabling ssd optimizations Jul 2 11:10:28.727704 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Jul 2 11:10:28.727929 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Jul 2 11:10:28.742170 systemd[1]: Finished sysroot-boot.service. Jul 2 11:10:29.194403 ignition[1047]: INFO : Ignition 2.14.0 Jul 2 11:10:29.194403 ignition[1047]: INFO : Stage: files Jul 2 11:10:29.194403 ignition[1047]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 11:10:29.194403 ignition[1047]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Jul 2 11:10:29.194403 ignition[1047]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 11:10:29.194403 ignition[1047]: DEBUG : files: compiled without relabeling support, skipping Jul 2 11:10:29.194403 ignition[1047]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 11:10:29.194403 ignition[1047]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 11:10:29.194403 ignition[1047]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 11:10:29.194403 ignition[1047]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 11:10:29.194403 ignition[1047]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 11:10:29.194403 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 11:10:29.194403 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Jul 2 11:10:29.392533 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1056) Jul 2 11:10:28.947713 systemd[1]: Finished ignition-mount.service. Jul 2 11:10:29.399509 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Jul 2 11:10:29.399509 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Jul 2 11:10:29.399509 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Jul 2 11:10:29.399509 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 11:10:29.399509 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 2 11:10:29.399509 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 2 11:10:29.399509 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 11:10:29.399509 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 11:10:29.399509 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 11:10:29.399509 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 11:10:29.399509 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 11:10:29.399509 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 11:10:29.399509 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 11:10:29.399509 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 11:10:29.399509 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Jul 2 11:10:29.399509 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Jul 2 11:10:28.959551 systemd[1]: Starting ignition-files.service... Jul 2 11:10:29.672568 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3215890718" Jul 2 11:10:29.672568 ignition[1047]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3215890718": device or resource busy Jul 2 11:10:29.672568 ignition[1047]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3215890718", trying btrfs: device or resource busy Jul 2 11:10:29.672568 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3215890718" Jul 2 11:10:29.672568 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3215890718" Jul 2 11:10:29.672568 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3215890718" Jul 2 11:10:29.672568 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3215890718" Jul 2 11:10:29.672568 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/packet-phone-home.service" Jul 2 11:10:29.672568 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 11:10:29.672568 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Jul 2 11:10:29.023024 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 11:10:29.158750 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 11:10:29.873446 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Jul 2 11:10:29.186960 unknown[1047]: wrote ssh authorized keys file for user: core Jul 2 11:10:29.341534 systemd[1]: mnt-oem3215890718.mount: Deactivated successfully. Jul 2 11:10:30.028024 ignition[1047]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Jul 2 11:10:30.028024 ignition[1047]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Jul 2 11:10:30.028024 ignition[1047]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Jul 2 11:10:30.028024 ignition[1047]: INFO : files: op(10): [started] processing unit "packet-phone-home.service" Jul 2 11:10:30.028024 ignition[1047]: INFO : files: op(10): [finished] processing unit "packet-phone-home.service" Jul 2 11:10:30.028024 ignition[1047]: INFO : files: op(11): [started] processing unit "prepare-helm.service" Jul 2 11:10:30.110511 ignition[1047]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 11:10:30.110511 ignition[1047]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 11:10:30.110511 ignition[1047]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" Jul 2 11:10:30.110511 ignition[1047]: INFO : files: op(13): [started] setting preset to enabled for "packet-phone-home.service" Jul 2 11:10:30.110511 ignition[1047]: INFO : files: op(13): [finished] setting preset to enabled for "packet-phone-home.service" Jul 2 11:10:30.110511 ignition[1047]: INFO : files: op(14): [started] setting preset to enabled for "prepare-helm.service" Jul 2 11:10:30.110511 ignition[1047]: INFO : files: op(14): [finished] setting preset to enabled for "prepare-helm.service" Jul 2 11:10:30.110511 ignition[1047]: INFO : files: op(15): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 11:10:30.110511 ignition[1047]: INFO : files: op(15): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Jul 2 11:10:30.110511 ignition[1047]: INFO : files: createResultFile: createFiles: op(16): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 11:10:30.110511 ignition[1047]: INFO : files: createResultFile: createFiles: op(16): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 11:10:30.110511 ignition[1047]: INFO : files: files passed Jul 2 11:10:30.110511 ignition[1047]: INFO : POST message to Packet Timeline Jul 2 11:10:30.110511 ignition[1047]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Jul 2 11:10:30.110511 ignition[1047]: INFO : GET result: OK Jul 2 11:10:30.370455 kernel: audit: type=1130 audit(1719918630.262:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.262000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.240083 systemd[1]: Finished ignition-files.service. Jul 2 11:10:30.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.388561 ignition[1047]: INFO : Ignition finished successfully Jul 2 11:10:30.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.268207 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 11:10:30.422631 initrd-setup-root-after-ignition[1081]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 11:10:30.330518 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 11:10:30.330849 systemd[1]: Starting ignition-quench.service... Jul 2 11:10:30.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.363705 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 11:10:30.380699 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 11:10:30.380775 systemd[1]: Finished ignition-quench.service. Jul 2 11:10:30.396567 systemd[1]: Reached target ignition-complete.target. Jul 2 11:10:30.414396 systemd[1]: Starting initrd-parse-etc.service... Jul 2 11:10:30.456903 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 11:10:30.548000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.457145 systemd[1]: Finished initrd-parse-etc.service. Jul 2 11:10:30.469024 systemd[1]: Reached target initrd-fs.target. Jul 2 11:10:30.483520 systemd[1]: Reached target initrd.target. Jul 2 11:10:30.498749 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 11:10:30.500850 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 11:10:30.534509 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 11:10:30.550865 systemd[1]: Starting initrd-cleanup.service... Jul 2 11:10:30.641000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.580456 systemd[1]: Stopped target nss-lookup.target. Jul 2 11:10:30.592977 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 11:10:30.612023 systemd[1]: Stopped target timers.target. Jul 2 11:10:30.626934 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 11:10:30.627321 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 11:10:30.642284 systemd[1]: Stopped target initrd.target. Jul 2 11:10:30.655970 systemd[1]: Stopped target basic.target. Jul 2 11:10:30.669947 systemd[1]: Stopped target ignition-complete.target. Jul 2 11:10:30.685946 systemd[1]: Stopped target ignition-diskful.target. Jul 2 11:10:30.701923 systemd[1]: Stopped target initrd-root-device.target. Jul 2 11:10:30.717938 systemd[1]: Stopped target remote-fs.target. Jul 2 11:10:30.733944 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 11:10:30.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.749953 systemd[1]: Stopped target sysinit.target. Jul 2 11:10:30.765957 systemd[1]: Stopped target local-fs.target. Jul 2 11:10:30.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.781922 systemd[1]: Stopped target local-fs-pre.target. Jul 2 11:10:30.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.797929 systemd[1]: Stopped target swap.target. Jul 2 11:10:30.812833 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 11:10:30.813196 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 11:10:30.829165 systemd[1]: Stopped target cryptsetup.target. Jul 2 11:10:30.844862 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 11:10:30.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.845228 systemd[1]: Stopped dracut-initqueue.service. Jul 2 11:10:30.969000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.861126 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 11:10:30.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.861508 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 11:10:31.009496 ignition[1096]: INFO : Ignition 2.14.0 Jul 2 11:10:31.009496 ignition[1096]: INFO : Stage: umount Jul 2 11:10:31.009496 ignition[1096]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Jul 2 11:10:31.009496 ignition[1096]: DEBUG : parsing config with SHA512: 0131bd505bfe1b1215ca4ec9809701a3323bf448114294874f7249d8d300440bd742a7532f60673bfa0746c04de0bd5ca68d0fe9a8ecd59464b13a6401323cb4 Jul 2 11:10:31.009496 ignition[1096]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/packet" Jul 2 11:10:31.009496 ignition[1096]: INFO : umount: umount passed Jul 2 11:10:31.009496 ignition[1096]: INFO : POST message to Packet Timeline Jul 2 11:10:31.009496 ignition[1096]: INFO : GET https://metadata.packet.net/metadata: attempt #1 Jul 2 11:10:31.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.110000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.876166 systemd[1]: Stopped target paths.target. Jul 2 11:10:31.158000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.165648 iscsid[900]: iscsid shutting down. Jul 2 11:10:31.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.181730 ignition[1096]: INFO : GET result: OK Jul 2 11:10:30.889829 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 11:10:31.212541 ignition[1096]: INFO : Ignition finished successfully Jul 2 11:10:30.893473 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 11:10:30.904947 systemd[1]: Stopped target slices.target. Jul 2 11:10:31.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.919932 systemd[1]: Stopped target sockets.target. Jul 2 11:10:31.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.935973 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 11:10:31.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.936379 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 11:10:31.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.295000 audit: BPF prog-id=6 op=UNLOAD Jul 2 11:10:30.953070 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 11:10:30.953449 systemd[1]: Stopped ignition-files.service. Jul 2 11:10:31.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.970034 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Jul 2 11:10:31.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.970421 systemd[1]: Stopped flatcar-metadata-hostname.service. Jul 2 11:10:31.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:30.987199 systemd[1]: Stopping ignition-mount.service... Jul 2 11:10:31.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.001676 systemd[1]: Stopping iscsid.service... Jul 2 11:10:31.016443 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 11:10:31.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.016623 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 11:10:31.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.033260 systemd[1]: Stopping sysroot-boot.service... Jul 2 11:10:31.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.047432 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 11:10:31.047721 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 11:10:31.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.067942 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 11:10:31.068283 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 11:10:31.095275 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 11:10:31.096893 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 11:10:31.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.097137 systemd[1]: Stopped iscsid.service. Jul 2 11:10:31.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.111736 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 11:10:31.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.112072 systemd[1]: Closed iscsid.socket. Jul 2 11:10:31.125737 systemd[1]: Stopping iscsiuio.service... Jul 2 11:10:31.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.141978 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 11:10:31.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.142211 systemd[1]: Stopped iscsiuio.service. Jul 2 11:10:31.159216 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 11:10:31.159453 systemd[1]: Finished initrd-cleanup.service. Jul 2 11:10:31.175594 systemd[1]: Stopped target network.target. Jul 2 11:10:31.189490 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 11:10:31.189509 systemd[1]: Closed iscsiuio.socket. Jul 2 11:10:31.202595 systemd[1]: Stopping systemd-networkd.service... Jul 2 11:10:31.212434 systemd-networkd[879]: enp1s0f0np0: DHCPv6 lease lost Jul 2 11:10:31.219580 systemd[1]: Stopping systemd-resolved.service... Jul 2 11:10:31.224347 systemd-networkd[879]: enp1s0f1np1: DHCPv6 lease lost Jul 2 11:10:31.681000 audit: BPF prog-id=9 op=UNLOAD Jul 2 11:10:31.228867 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 11:10:31.228962 systemd[1]: Stopped systemd-resolved.service. Jul 2 11:10:31.251929 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 11:10:31.252242 systemd[1]: Stopped systemd-networkd.service. Jul 2 11:10:31.257589 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 11:10:31.257627 systemd[1]: Stopped ignition-mount.service. Jul 2 11:10:31.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:31.278643 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 11:10:31.278694 systemd[1]: Stopped sysroot-boot.service. Jul 2 11:10:31.295662 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 11:10:31.295699 systemd[1]: Closed systemd-networkd.socket. Jul 2 11:10:31.311635 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 11:10:31.311739 systemd[1]: Stopped ignition-disks.service. Jul 2 11:10:31.327629 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 11:10:31.819284 systemd-journald[267]: Received SIGTERM from PID 1 (n/a). Jul 2 11:10:31.327754 systemd[1]: Stopped ignition-kargs.service. Jul 2 11:10:31.342672 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 11:10:31.342816 systemd[1]: Stopped ignition-setup.service. Jul 2 11:10:31.360700 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 11:10:31.360851 systemd[1]: Stopped initrd-setup-root.service. Jul 2 11:10:31.378418 systemd[1]: Stopping network-cleanup.service... Jul 2 11:10:31.391474 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 11:10:31.391660 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 11:10:31.406668 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 11:10:31.406804 systemd[1]: Stopped systemd-sysctl.service. Jul 2 11:10:31.424923 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 11:10:31.425065 systemd[1]: Stopped systemd-modules-load.service. Jul 2 11:10:31.439921 systemd[1]: Stopping systemd-udevd.service... Jul 2 11:10:31.458314 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 11:10:31.459742 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 11:10:31.460104 systemd[1]: Stopped systemd-udevd.service. Jul 2 11:10:31.476100 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 11:10:31.476248 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 11:10:31.489603 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 11:10:31.489701 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 11:10:31.507370 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 11:10:31.507393 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 11:10:31.529469 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 11:10:31.529499 systemd[1]: Stopped dracut-cmdline.service. Jul 2 11:10:31.545465 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 11:10:31.545523 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 11:10:31.561473 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 11:10:31.576387 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 11:10:31.576415 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 11:10:31.589432 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 11:10:31.589663 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 11:10:31.713145 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 11:10:31.713188 systemd[1]: Stopped network-cleanup.service. Jul 2 11:10:31.735603 systemd[1]: Reached target initrd-switch-root.target. Jul 2 11:10:31.753061 systemd[1]: Starting initrd-switch-root.service... Jul 2 11:10:31.777255 systemd[1]: Switching root. Jul 2 11:10:31.819999 systemd-journald[267]: Journal stopped Jul 2 11:10:35.860217 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 11:10:35.860230 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 11:10:35.860239 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 11:10:35.860245 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 11:10:35.860250 kernel: SELinux: policy capability open_perms=1 Jul 2 11:10:35.860256 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 11:10:35.860262 kernel: SELinux: policy capability always_check_network=0 Jul 2 11:10:35.860270 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 11:10:35.860276 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 11:10:35.860283 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 11:10:35.860289 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 11:10:35.860295 systemd[1]: Successfully loaded SELinux policy in 305.127ms. Jul 2 11:10:35.860302 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.505ms. Jul 2 11:10:35.860309 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 11:10:35.860317 systemd[1]: Detected architecture x86-64. Jul 2 11:10:35.860323 systemd[1]: Detected first boot. Jul 2 11:10:35.860329 systemd[1]: Hostname set to . Jul 2 11:10:35.860336 systemd[1]: Initializing machine ID from random generator. Jul 2 11:10:35.860342 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 11:10:35.860348 systemd[1]: Populated /etc with preset unit settings. Jul 2 11:10:35.860354 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 11:10:35.860362 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 11:10:35.860369 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 11:10:35.860375 kernel: kauditd_printk_skb: 58 callbacks suppressed Jul 2 11:10:35.860381 kernel: audit: type=1334 audit(1719918634.187:92): prog-id=12 op=LOAD Jul 2 11:10:35.860387 kernel: audit: type=1334 audit(1719918634.187:93): prog-id=3 op=UNLOAD Jul 2 11:10:35.860393 kernel: audit: type=1334 audit(1719918634.250:94): prog-id=13 op=LOAD Jul 2 11:10:35.860398 kernel: audit: type=1334 audit(1719918634.272:95): prog-id=14 op=LOAD Jul 2 11:10:35.860405 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 11:10:35.860412 kernel: audit: type=1334 audit(1719918634.272:96): prog-id=4 op=UNLOAD Jul 2 11:10:35.860418 systemd[1]: Stopped initrd-switch-root.service. Jul 2 11:10:35.860424 kernel: audit: type=1334 audit(1719918634.272:97): prog-id=5 op=UNLOAD Jul 2 11:10:35.860430 kernel: audit: type=1131 audit(1719918634.272:98): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:35.860436 kernel: audit: type=1334 audit(1719918634.421:99): prog-id=12 op=UNLOAD Jul 2 11:10:35.860442 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 11:10:35.860449 kernel: audit: type=1130 audit(1719918634.434:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:35.860455 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 11:10:35.860462 kernel: audit: type=1131 audit(1719918634.434:101): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:35.860468 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 11:10:35.860474 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Jul 2 11:10:35.860482 systemd[1]: Created slice system-getty.slice. Jul 2 11:10:35.860489 systemd[1]: Created slice system-modprobe.slice. Jul 2 11:10:35.860495 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 11:10:35.860503 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 11:10:35.860509 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 11:10:35.860516 systemd[1]: Created slice user.slice. Jul 2 11:10:35.860522 systemd[1]: Started systemd-ask-password-console.path. Jul 2 11:10:35.860529 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 11:10:35.860535 systemd[1]: Set up automount boot.automount. Jul 2 11:10:35.860542 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 11:10:35.860548 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 11:10:35.860555 systemd[1]: Stopped target initrd-fs.target. Jul 2 11:10:35.860563 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 11:10:35.860569 systemd[1]: Reached target integritysetup.target. Jul 2 11:10:35.860576 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 11:10:35.860582 systemd[1]: Reached target remote-fs.target. Jul 2 11:10:35.860589 systemd[1]: Reached target slices.target. Jul 2 11:10:35.860595 systemd[1]: Reached target swap.target. Jul 2 11:10:35.860602 systemd[1]: Reached target torcx.target. Jul 2 11:10:35.860608 systemd[1]: Reached target veritysetup.target. Jul 2 11:10:35.860615 systemd[1]: Listening on systemd-coredump.socket. Jul 2 11:10:35.860622 systemd[1]: Listening on systemd-initctl.socket. Jul 2 11:10:35.860629 systemd[1]: Listening on systemd-networkd.socket. Jul 2 11:10:35.860636 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 11:10:35.860643 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 11:10:35.860650 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 11:10:35.860657 systemd[1]: Mounting dev-hugepages.mount... Jul 2 11:10:35.860663 systemd[1]: Mounting dev-mqueue.mount... Jul 2 11:10:35.860670 systemd[1]: Mounting media.mount... Jul 2 11:10:35.860677 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 11:10:35.860684 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 11:10:35.860690 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 11:10:35.860697 systemd[1]: Mounting tmp.mount... Jul 2 11:10:35.860705 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 11:10:35.860712 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 11:10:35.860718 systemd[1]: Starting kmod-static-nodes.service... Jul 2 11:10:35.860725 systemd[1]: Starting modprobe@configfs.service... Jul 2 11:10:35.860732 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 11:10:35.860738 systemd[1]: Starting modprobe@drm.service... Jul 2 11:10:35.860745 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 11:10:35.860752 systemd[1]: Starting modprobe@fuse.service... Jul 2 11:10:35.860758 kernel: fuse: init (API version 7.34) Jul 2 11:10:35.860765 systemd[1]: Starting modprobe@loop.service... Jul 2 11:10:35.860772 kernel: loop: module loaded Jul 2 11:10:35.860778 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 11:10:35.860785 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 11:10:35.860792 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 11:10:35.860798 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 11:10:35.860805 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 11:10:35.860812 systemd[1]: Stopped systemd-journald.service. Jul 2 11:10:35.860818 systemd[1]: Starting systemd-journald.service... Jul 2 11:10:35.860826 systemd[1]: Starting systemd-modules-load.service... Jul 2 11:10:35.860835 systemd-journald[1248]: Journal started Jul 2 11:10:35.860860 systemd-journald[1248]: Runtime Journal (/run/log/journal/dc8629d30c4642e898ee9a421f98bdc2) is 8.0M, max 640.1M, 632.1M free. Jul 2 11:10:32.231000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 11:10:32.518000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 11:10:32.521000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 11:10:32.521000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 11:10:32.521000 audit: BPF prog-id=10 op=LOAD Jul 2 11:10:32.521000 audit: BPF prog-id=10 op=UNLOAD Jul 2 11:10:32.521000 audit: BPF prog-id=11 op=LOAD Jul 2 11:10:32.521000 audit: BPF prog-id=11 op=UNLOAD Jul 2 11:10:32.640000 audit[1138]: AVC avc: denied { associate } for pid=1138 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 11:10:32.640000 audit[1138]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001a58e2 a1=c00002ce58 a2=c00002b100 a3=32 items=0 ppid=1121 pid=1138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:32.640000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 11:10:32.666000 audit[1138]: AVC avc: denied { associate } for pid=1138 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 11:10:32.666000 audit[1138]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001a59b9 a2=1ed a3=0 items=2 ppid=1121 pid=1138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:32.666000 audit: CWD cwd="/" Jul 2 11:10:32.666000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:32.666000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:32.666000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 11:10:34.187000 audit: BPF prog-id=12 op=LOAD Jul 2 11:10:34.187000 audit: BPF prog-id=3 op=UNLOAD Jul 2 11:10:34.250000 audit: BPF prog-id=13 op=LOAD Jul 2 11:10:34.272000 audit: BPF prog-id=14 op=LOAD Jul 2 11:10:34.272000 audit: BPF prog-id=4 op=UNLOAD Jul 2 11:10:34.272000 audit: BPF prog-id=5 op=UNLOAD Jul 2 11:10:34.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:34.421000 audit: BPF prog-id=12 op=UNLOAD Jul 2 11:10:34.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:34.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:35.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:35.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:35.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:35.832000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:35.832000 audit: BPF prog-id=15 op=LOAD Jul 2 11:10:35.833000 audit: BPF prog-id=16 op=LOAD Jul 2 11:10:35.833000 audit: BPF prog-id=17 op=LOAD Jul 2 11:10:35.833000 audit: BPF prog-id=13 op=UNLOAD Jul 2 11:10:35.833000 audit: BPF prog-id=14 op=UNLOAD Jul 2 11:10:35.857000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 11:10:35.857000 audit[1248]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd3bb3d110 a2=4000 a3=7ffd3bb3d1ac items=0 ppid=1 pid=1248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:35.857000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 11:10:34.185613 systemd[1]: Queued start job for default target multi-user.target. Jul 2 11:10:32.634436 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 11:10:34.272731 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 11:10:32.635358 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 11:10:32.635422 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 11:10:32.635507 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:32Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 11:10:32.635539 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:32Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 11:10:32.635622 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:32Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 11:10:32.635662 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:32Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 11:10:32.636170 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:32Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 11:10:32.636312 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 11:10:32.636356 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 11:10:32.638694 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 11:10:32.638825 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 11:10:32.638890 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 11:10:32.638937 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 11:10:32.638989 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 11:10:32.639031 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 11:10:33.838620 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:33Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 11:10:33.838774 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:33Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 11:10:33.838837 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:33Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 11:10:33.838943 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:33Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 11:10:33.838973 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:33Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 11:10:33.839007 /usr/lib/systemd/system-generators/torcx-generator[1138]: time="2024-07-02T11:10:33Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 11:10:35.891463 systemd[1]: Starting systemd-network-generator.service... Jul 2 11:10:35.913282 systemd[1]: Starting systemd-remount-fs.service... Jul 2 11:10:35.935315 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 11:10:35.967803 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 11:10:35.967861 systemd[1]: Stopped verity-setup.service. Jul 2 11:10:35.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.002311 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 11:10:36.016326 systemd[1]: Started systemd-journald.service. Jul 2 11:10:36.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.024934 systemd[1]: Mounted dev-hugepages.mount. Jul 2 11:10:36.032549 systemd[1]: Mounted dev-mqueue.mount. Jul 2 11:10:36.039539 systemd[1]: Mounted media.mount. Jul 2 11:10:36.046546 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 11:10:36.055534 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 11:10:36.064507 systemd[1]: Mounted tmp.mount. Jul 2 11:10:36.071610 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 11:10:36.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.080634 systemd[1]: Finished kmod-static-nodes.service. Jul 2 11:10:36.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.089676 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 11:10:36.089805 systemd[1]: Finished modprobe@configfs.service. Jul 2 11:10:36.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.098838 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 11:10:36.099049 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 11:10:36.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.108975 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 11:10:36.109231 systemd[1]: Finished modprobe@drm.service. Jul 2 11:10:36.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.118089 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 11:10:36.118413 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 11:10:36.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.127151 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 11:10:36.127473 systemd[1]: Finished modprobe@fuse.service. Jul 2 11:10:36.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.136096 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 11:10:36.136426 systemd[1]: Finished modprobe@loop.service. Jul 2 11:10:36.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.145232 systemd[1]: Finished systemd-modules-load.service. Jul 2 11:10:36.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.154120 systemd[1]: Finished systemd-network-generator.service. Jul 2 11:10:36.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.163105 systemd[1]: Finished systemd-remount-fs.service. Jul 2 11:10:36.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.172103 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 11:10:36.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.181896 systemd[1]: Reached target network-pre.target. Jul 2 11:10:36.193118 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 11:10:36.203928 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 11:10:36.210545 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 11:10:36.213743 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 11:10:36.223767 systemd[1]: Starting systemd-journal-flush.service... Jul 2 11:10:36.232464 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 11:10:36.232955 systemd[1]: Starting systemd-random-seed.service... Jul 2 11:10:36.233122 systemd-journald[1248]: Time spent on flushing to /var/log/journal/dc8629d30c4642e898ee9a421f98bdc2 is 15.322ms for 1575 entries. Jul 2 11:10:36.233122 systemd-journald[1248]: System Journal (/var/log/journal/dc8629d30c4642e898ee9a421f98bdc2) is 8.0M, max 195.6M, 187.6M free. Jul 2 11:10:36.275593 systemd-journald[1248]: Received client request to flush runtime journal. Jul 2 11:10:36.248422 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 11:10:36.249679 systemd[1]: Starting systemd-sysctl.service... Jul 2 11:10:36.259165 systemd[1]: Starting systemd-sysusers.service... Jul 2 11:10:36.268083 systemd[1]: Starting systemd-udev-settle.service... Jul 2 11:10:36.275431 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 11:10:36.283515 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 11:10:36.291497 systemd[1]: Finished systemd-journal-flush.service. Jul 2 11:10:36.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.299499 systemd[1]: Finished systemd-random-seed.service. Jul 2 11:10:36.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.307479 systemd[1]: Finished systemd-sysctl.service. Jul 2 11:10:36.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.315437 systemd[1]: Finished systemd-sysusers.service. Jul 2 11:10:36.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.324445 systemd[1]: Reached target first-boot-complete.target. Jul 2 11:10:36.332607 udevadm[1263]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Jul 2 11:10:36.522825 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 11:10:36.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.531000 audit: BPF prog-id=18 op=LOAD Jul 2 11:10:36.531000 audit: BPF prog-id=19 op=LOAD Jul 2 11:10:36.531000 audit: BPF prog-id=7 op=UNLOAD Jul 2 11:10:36.532000 audit: BPF prog-id=8 op=UNLOAD Jul 2 11:10:36.532639 systemd[1]: Starting systemd-udevd.service... Jul 2 11:10:36.544372 systemd-udevd[1265]: Using default interface naming scheme 'v252'. Jul 2 11:10:36.562907 systemd[1]: Started systemd-udevd.service. Jul 2 11:10:36.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.573458 systemd[1]: Condition check resulted in dev-ttyS1.device being skipped. Jul 2 11:10:36.573000 audit: BPF prog-id=20 op=LOAD Jul 2 11:10:36.574574 systemd[1]: Starting systemd-networkd.service... Jul 2 11:10:36.595312 kernel: mousedev: PS/2 mouse device common for all mice Jul 2 11:10:36.595403 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0E:00/input/input2 Jul 2 11:10:36.612000 audit: BPF prog-id=21 op=LOAD Jul 2 11:10:36.612000 audit: BPF prog-id=22 op=LOAD Jul 2 11:10:36.605000 audit[1327]: AVC avc: denied { confidentiality } for pid=1327 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Jul 2 11:10:36.613000 audit: BPF prog-id=23 op=LOAD Jul 2 11:10:36.617428 systemd[1]: Starting systemd-userdbd.service... Jul 2 11:10:36.625386 kernel: ACPI: button: Sleep Button [SLPB] Jul 2 11:10:36.625446 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1339) Jul 2 11:10:36.625472 kernel: IPMI message handler: version 39.2 Jul 2 11:10:36.655078 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input3 Jul 2 11:10:36.662708 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 11:10:36.605000 audit[1327]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=564fe83dd570 a1=4d8bc a2=7f26dcd40bc5 a3=5 items=42 ppid=1265 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:36.605000 audit: CWD cwd="/" Jul 2 11:10:36.605000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=1 name=(null) inode=8313 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=2 name=(null) inode=8313 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=3 name=(null) inode=8314 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=4 name=(null) inode=8313 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=5 name=(null) inode=8315 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=6 name=(null) inode=8313 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=7 name=(null) inode=8316 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=8 name=(null) inode=8316 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=9 name=(null) inode=8317 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=10 name=(null) inode=8316 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=11 name=(null) inode=8318 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=12 name=(null) inode=8316 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=13 name=(null) inode=8319 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=14 name=(null) inode=8316 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=15 name=(null) inode=8320 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=16 name=(null) inode=8316 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=17 name=(null) inode=8321 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=18 name=(null) inode=8313 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=19 name=(null) inode=8322 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=20 name=(null) inode=8322 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=21 name=(null) inode=8323 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=22 name=(null) inode=8322 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=23 name=(null) inode=8324 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=24 name=(null) inode=8322 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=25 name=(null) inode=8325 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=26 name=(null) inode=8322 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=27 name=(null) inode=8326 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=28 name=(null) inode=8322 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=29 name=(null) inode=8327 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=30 name=(null) inode=8313 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=31 name=(null) inode=8328 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=32 name=(null) inode=8328 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=33 name=(null) inode=8329 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=34 name=(null) inode=8328 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=35 name=(null) inode=8330 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=36 name=(null) inode=8328 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=37 name=(null) inode=8331 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=38 name=(null) inode=8328 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=39 name=(null) inode=8332 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=40 name=(null) inode=8328 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PATH item=41 name=(null) inode=8333 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:10:36.605000 audit: PROCTITLE proctitle="(udev-worker)" Jul 2 11:10:36.706285 kernel: ACPI: button: Power Button [PWRF] Jul 2 11:10:36.714705 systemd[1]: Started systemd-userdbd.service. Jul 2 11:10:36.725269 kernel: ipmi device interface Jul 2 11:10:36.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:36.745274 kernel: mei_me 0000:00:16.0: Device doesn't have valid ME Interface Jul 2 11:10:36.745449 kernel: mei_me 0000:00:16.4: Device doesn't have valid ME Interface Jul 2 11:10:36.762279 kernel: i801_smbus 0000:00:1f.4: SPD Write Disable is set Jul 2 11:10:36.792516 kernel: ipmi_si: IPMI System Interface driver Jul 2 11:10:36.792594 kernel: i801_smbus 0000:00:1f.4: SMBus using PCI interrupt Jul 2 11:10:36.792730 kernel: ipmi_si dmi-ipmi-si.0: ipmi_platform: probing via SMBIOS Jul 2 11:10:36.841286 kernel: i2c i2c-0: 2/4 memory slots populated (from DMI) Jul 2 11:10:36.841406 kernel: ipmi_platform: ipmi_si: SMBIOS: io 0xca2 regsize 1 spacing 1 irq 0 Jul 2 11:10:36.874875 kernel: ipmi_si: Adding SMBIOS-specified kcs state machine Jul 2 11:10:36.874912 kernel: ipmi_si IPI0001:00: ipmi_platform: probing via ACPI Jul 2 11:10:36.909537 kernel: ipmi_si IPI0001:00: ipmi_platform: [io 0x0ca2] regsize 1 spacing 1 irq 0 Jul 2 11:10:36.950535 kernel: ipmi_si dmi-ipmi-si.0: Removing SMBIOS-specified kcs state machine in favor of ACPI Jul 2 11:10:36.950697 kernel: ipmi_si: Adding ACPI-specified kcs state machine Jul 2 11:10:36.950711 kernel: ipmi_si: Trying ACPI-specified kcs state machine at i/o address 0xca2, slave address 0x20, irq 0 Jul 2 11:10:36.950722 kernel: iTCO_vendor_support: vendor-support=0 Jul 2 11:10:37.009754 systemd-networkd[1298]: bond0: netdev ready Jul 2 11:10:37.011895 systemd-networkd[1298]: lo: Link UP Jul 2 11:10:37.011897 systemd-networkd[1298]: lo: Gained carrier Jul 2 11:10:37.012394 systemd-networkd[1298]: Enumeration completed Jul 2 11:10:37.012482 systemd[1]: Started systemd-networkd.service. Jul 2 11:10:37.012683 systemd-networkd[1298]: bond0: Configuring with /etc/systemd/network/05-bond0.network. Jul 2 11:10:37.015450 systemd-networkd[1298]: enp1s0f1np1: Configuring with /etc/systemd/network/10-0c:42:a1:11:26:79.network. Jul 2 11:10:37.024271 kernel: ipmi_si IPI0001:00: The BMC does not support clearing the recv irq bit, compensating, but the BMC needs to be fixed. Jul 2 11:10:37.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:37.066426 kernel: iTCO_wdt iTCO_wdt: Found a Intel PCH TCO device (Version=6, TCOBASE=0x0400) Jul 2 11:10:37.066540 kernel: iTCO_wdt iTCO_wdt: initialized. heartbeat=30 sec (nowayout=0) Jul 2 11:10:37.066615 kernel: ipmi_si IPI0001:00: IPMI message handler: Found new BMC (man_id: 0x002a7c, prod_id: 0x1b0f, dev_id: 0x20) Jul 2 11:10:37.127712 kernel: intel_rapl_common: Found RAPL domain package Jul 2 11:10:37.127749 kernel: intel_rapl_common: Found RAPL domain core Jul 2 11:10:37.127771 kernel: intel_rapl_common: Found RAPL domain dram Jul 2 11:10:37.219273 kernel: ipmi_si IPI0001:00: IPMI kcs interface initialized Jul 2 11:10:37.237272 kernel: ipmi_ssif: IPMI SSIF Interface driver Jul 2 11:10:37.400336 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Jul 2 11:10:37.423308 kernel: bond0: (slave enp1s0f1np1): Enslaving as a backup interface with an up link Jul 2 11:10:37.426374 systemd-networkd[1298]: enp1s0f0np0: Configuring with /etc/systemd/network/10-0c:42:a1:11:26:78.network. Jul 2 11:10:37.453287 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Jul 2 11:10:37.458591 systemd[1]: Finished systemd-udev-settle.service. Jul 2 11:10:37.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:37.467140 systemd[1]: Starting lvm2-activation-early.service... Jul 2 11:10:37.483450 lvm[1371]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 11:10:37.512695 systemd[1]: Finished lvm2-activation-early.service. Jul 2 11:10:37.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:37.521382 systemd[1]: Reached target cryptsetup.target. Jul 2 11:10:37.530939 systemd[1]: Starting lvm2-activation.service... Jul 2 11:10:37.533022 lvm[1373]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 11:10:37.579319 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Jul 2 11:10:37.584721 systemd[1]: Finished lvm2-activation.service. Jul 2 11:10:37.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:37.592385 systemd[1]: Reached target local-fs-pre.target. Jul 2 11:10:37.601351 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 11:10:37.601393 systemd[1]: Reached target local-fs.target. Jul 2 11:10:37.610304 systemd[1]: Reached target machines.target. Jul 2 11:10:37.618961 systemd[1]: Starting ldconfig.service... Jul 2 11:10:37.626016 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 11:10:37.626036 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 11:10:37.626638 systemd[1]: Starting systemd-boot-update.service... Jul 2 11:10:37.633863 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 11:10:37.643854 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 11:10:37.644436 systemd[1]: Starting systemd-sysext.service... Jul 2 11:10:37.644627 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1375 (bootctl) Jul 2 11:10:37.645425 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 11:10:37.658938 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 11:10:37.664942 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 11:10:37.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:37.668382 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 11:10:37.668508 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 11:10:37.704327 kernel: loop0: detected capacity change from 0 to 210664 Jul 2 11:10:37.704428 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Jul 2 11:10:37.778316 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 11:10:37.794277 kernel: mlx5_core 0000:01:00.0 enp1s0f0np0: Link up Jul 2 11:10:37.795090 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 11:10:37.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:37.820308 kernel: bond0: (slave enp1s0f0np0): Enslaving as a backup interface with an up link Jul 2 11:10:37.820358 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready Jul 2 11:10:37.824095 systemd-fsck[1384]: fsck.fat 4.2 (2021-01-31) Jul 2 11:10:37.824095 systemd-fsck[1384]: /dev/sda1: 789 files, 119238/258078 clusters Jul 2 11:10:37.826175 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 11:10:37.838304 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 11:10:37.839128 systemd-networkd[1298]: bond0: Link UP Jul 2 11:10:37.839367 systemd-networkd[1298]: enp1s0f1np1: Link UP Jul 2 11:10:37.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:37.855166 systemd[1]: Mounting boot.mount... Jul 2 11:10:37.858268 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Jul 2 11:10:37.878270 kernel: bond0: active interface up! Jul 2 11:10:37.908157 systemd[1]: Mounted boot.mount. Jul 2 11:10:37.913801 systemd-networkd[1298]: enp1s0f1np1: Gained carrier Jul 2 11:10:37.914323 kernel: bond0: (slave enp1s0f0np0): link status definitely up, 25000 Mbps full duplex Jul 2 11:10:37.914776 systemd-networkd[1298]: enp1s0f1np1: Reconfiguring with /etc/systemd/network/10-0c:42:a1:11:26:78.network. Jul 2 11:10:37.932317 systemd[1]: Finished systemd-boot-update.service. Jul 2 11:10:37.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:37.956270 kernel: loop1: detected capacity change from 0 to 210664 Jul 2 11:10:37.956299 kernel: bond0: Warning: No 802.3ad response from the link partner for any adapters in the bond Jul 2 11:10:37.968855 (sd-sysext)[1390]: Using extensions 'kubernetes'. Jul 2 11:10:37.969093 (sd-sysext)[1390]: Merged extensions into '/usr'. Jul 2 11:10:37.985051 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 11:10:37.985768 systemd[1]: Mounting usr-share-oem.mount... Jul 2 11:10:37.992458 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 11:10:37.993091 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 11:10:37.999895 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 11:10:38.006856 systemd[1]: Starting modprobe@loop.service... Jul 2 11:10:38.013398 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 11:10:38.013464 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 11:10:38.013531 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 11:10:38.015118 systemd[1]: Mounted usr-share-oem.mount. Jul 2 11:10:38.035327 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 11:10:38.050541 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 11:10:38.050605 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 11:10:38.058308 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 11:10:38.065727 ldconfig[1374]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 11:10:38.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:38.075000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:38.075584 systemd[1]: Finished ldconfig.service. Jul 2 11:10:38.080327 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 11:10:38.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:38.095542 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 11:10:38.095605 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 11:10:38.102321 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 11:10:38.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:38.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:38.118552 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 11:10:38.118613 systemd[1]: Finished modprobe@loop.service. Jul 2 11:10:38.124306 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 11:10:38.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:38.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:38.141613 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 11:10:38.141676 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 11:10:38.142189 systemd[1]: Finished systemd-sysext.service. Jul 2 11:10:38.146311 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 11:10:38.146617 systemd-networkd[1298]: enp1s0f0np0: Link UP Jul 2 11:10:38.146803 systemd-networkd[1298]: bond0: Gained carrier Jul 2 11:10:38.146893 systemd-networkd[1298]: enp1s0f0np0: Gained carrier Jul 2 11:10:38.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:38.163956 systemd[1]: Starting ensure-sysext.service... Jul 2 11:10:38.168317 kernel: bond0: (slave enp1s0f1np1): link status down for interface, disabling it in 200 ms Jul 2 11:10:38.168346 kernel: bond0: (slave enp1s0f1np1): invalid new link 1 on slave Jul 2 11:10:38.185588 systemd-networkd[1298]: enp1s0f1np1: Link DOWN Jul 2 11:10:38.185590 systemd-networkd[1298]: enp1s0f1np1: Lost carrier Jul 2 11:10:38.191882 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 11:10:38.201903 systemd-tmpfiles[1397]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 11:10:38.202588 systemd[1]: Reloading. Jul 2 11:10:38.204535 systemd-tmpfiles[1397]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 11:10:38.208428 systemd-tmpfiles[1397]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 11:10:38.220753 /usr/lib/systemd/system-generators/torcx-generator[1416]: time="2024-07-02T11:10:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 11:10:38.220776 /usr/lib/systemd/system-generators/torcx-generator[1416]: time="2024-07-02T11:10:38Z" level=info msg="torcx already run" Jul 2 11:10:38.272584 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 11:10:38.272592 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 11:10:38.283812 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 11:10:38.327000 audit: BPF prog-id=24 op=LOAD Jul 2 11:10:38.327000 audit: BPF prog-id=25 op=LOAD Jul 2 11:10:38.327000 audit: BPF prog-id=18 op=UNLOAD Jul 2 11:10:38.327000 audit: BPF prog-id=19 op=UNLOAD Jul 2 11:10:38.327000 audit: BPF prog-id=26 op=LOAD Jul 2 11:10:38.327000 audit: BPF prog-id=20 op=UNLOAD Jul 2 11:10:38.328000 audit: BPF prog-id=27 op=LOAD Jul 2 11:10:38.328000 audit: BPF prog-id=15 op=UNLOAD Jul 2 11:10:38.329000 audit: BPF prog-id=28 op=LOAD Jul 2 11:10:38.329000 audit: BPF prog-id=29 op=LOAD Jul 2 11:10:38.329000 audit: BPF prog-id=16 op=UNLOAD Jul 2 11:10:38.329000 audit: BPF prog-id=17 op=UNLOAD Jul 2 11:10:38.329000 audit: BPF prog-id=30 op=LOAD Jul 2 11:10:38.329000 audit: BPF prog-id=21 op=UNLOAD Jul 2 11:10:38.329000 audit: BPF prog-id=31 op=LOAD Jul 2 11:10:38.329000 audit: BPF prog-id=32 op=LOAD Jul 2 11:10:38.329000 audit: BPF prog-id=22 op=UNLOAD Jul 2 11:10:38.329000 audit: BPF prog-id=23 op=UNLOAD Jul 2 11:10:38.331162 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 11:10:38.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:38.341227 systemd[1]: Starting audit-rules.service... Jul 2 11:10:38.353412 systemd[1]: Starting clean-ca-certificates.service... Jul 2 11:10:38.357000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 11:10:38.357000 audit[1493]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc6097d3b0 a2=420 a3=0 items=0 ppid=1477 pid=1493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:38.357000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 11:10:38.358261 augenrules[1493]: No rules Jul 2 11:10:38.363307 kernel: mlx5_core 0000:01:00.1 enp1s0f1np1: Link up Jul 2 11:10:38.377977 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 11:10:38.383311 kernel: bond0: (slave enp1s0f1np1): speed changed to 0 on port 1 Jul 2 11:10:38.383336 kernel: bond0: (slave enp1s0f1np1): link status up again after 200 ms Jul 2 11:10:38.384422 systemd-networkd[1298]: enp1s0f1np1: Link UP Jul 2 11:10:38.384576 systemd-networkd[1298]: enp1s0f1np1: Gained carrier Jul 2 11:10:38.420298 kernel: bond0: (slave enp1s0f1np1): link status definitely up, 25000 Mbps full duplex Jul 2 11:10:38.420262 systemd[1]: Starting systemd-resolved.service... Jul 2 11:10:38.428289 systemd[1]: Starting systemd-timesyncd.service... Jul 2 11:10:38.435869 systemd[1]: Starting systemd-update-utmp.service... Jul 2 11:10:38.442644 systemd[1]: Finished audit-rules.service. Jul 2 11:10:38.449483 systemd[1]: Finished clean-ca-certificates.service. Jul 2 11:10:38.457497 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 11:10:38.470857 systemd[1]: Finished systemd-update-utmp.service. Jul 2 11:10:38.479870 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 11:10:38.480484 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 11:10:38.487898 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 11:10:38.494858 systemd[1]: Starting modprobe@loop.service... Jul 2 11:10:38.500936 systemd-resolved[1499]: Positive Trust Anchors: Jul 2 11:10:38.500942 systemd-resolved[1499]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 11:10:38.500960 systemd-resolved[1499]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 11:10:38.501366 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 11:10:38.501437 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 11:10:38.502137 systemd[1]: Starting systemd-update-done.service... Jul 2 11:10:38.505291 systemd-resolved[1499]: Using system hostname 'ci-3510.3.5-a-18871bf0db'. Jul 2 11:10:38.510382 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 11:10:38.510889 systemd[1]: Started systemd-timesyncd.service. Jul 2 11:10:38.519572 systemd[1]: Started systemd-resolved.service. Jul 2 11:10:38.527557 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 11:10:38.527623 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 11:10:38.535533 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 11:10:38.535594 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 11:10:38.543548 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 11:10:38.543611 systemd[1]: Finished modprobe@loop.service. Jul 2 11:10:38.551548 systemd[1]: Finished systemd-update-done.service. Jul 2 11:10:38.559577 systemd[1]: Reached target network.target. Jul 2 11:10:38.567399 systemd[1]: Reached target nss-lookup.target. Jul 2 11:10:38.575403 systemd[1]: Reached target time-set.target. Jul 2 11:10:38.583389 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 11:10:38.583462 systemd[1]: Reached target sysinit.target. Jul 2 11:10:38.591447 systemd[1]: Started motdgen.path. Jul 2 11:10:38.598425 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 11:10:38.608478 systemd[1]: Started logrotate.timer. Jul 2 11:10:38.615455 systemd[1]: Started mdadm.timer. Jul 2 11:10:38.622401 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 11:10:38.630379 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 11:10:38.630440 systemd[1]: Reached target paths.target. Jul 2 11:10:38.637743 systemd[1]: Reached target timers.target. Jul 2 11:10:38.644544 systemd[1]: Listening on dbus.socket. Jul 2 11:10:38.651976 systemd[1]: Starting docker.socket... Jul 2 11:10:38.659880 systemd[1]: Listening on sshd.socket. Jul 2 11:10:38.666452 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 11:10:38.666521 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 11:10:38.667299 systemd[1]: Listening on docker.socket. Jul 2 11:10:38.676151 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 11:10:38.676214 systemd[1]: Reached target sockets.target. Jul 2 11:10:38.684393 systemd[1]: Reached target basic.target. Jul 2 11:10:38.691387 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 11:10:38.691437 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 11:10:38.691489 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 11:10:38.692047 systemd[1]: Starting containerd.service... Jul 2 11:10:38.698855 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Jul 2 11:10:38.707911 systemd[1]: Starting coreos-metadata.service... Jul 2 11:10:38.714950 systemd[1]: Starting dbus.service... Jul 2 11:10:38.720960 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 11:10:38.725829 jq[1517]: false Jul 2 11:10:38.727983 systemd[1]: Starting extend-filesystems.service... Jul 2 11:10:38.728567 coreos-metadata[1510]: Jul 02 11:10:38.728 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jul 2 11:10:38.734370 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 11:10:38.735064 systemd[1]: Starting modprobe@drm.service... Jul 2 11:10:38.735219 dbus-daemon[1516]: [system] SELinux support is enabled Jul 2 11:10:38.735930 extend-filesystems[1518]: Found loop1 Jul 2 11:10:38.756431 extend-filesystems[1518]: Found sda Jul 2 11:10:38.756431 extend-filesystems[1518]: Found sda1 Jul 2 11:10:38.756431 extend-filesystems[1518]: Found sda2 Jul 2 11:10:38.756431 extend-filesystems[1518]: Found sda3 Jul 2 11:10:38.756431 extend-filesystems[1518]: Found usr Jul 2 11:10:38.756431 extend-filesystems[1518]: Found sda4 Jul 2 11:10:38.756431 extend-filesystems[1518]: Found sda6 Jul 2 11:10:38.756431 extend-filesystems[1518]: Found sda7 Jul 2 11:10:38.756431 extend-filesystems[1518]: Found sda9 Jul 2 11:10:38.756431 extend-filesystems[1518]: Checking size of /dev/sda9 Jul 2 11:10:38.756431 extend-filesystems[1518]: Resized partition /dev/sda9 Jul 2 11:10:38.862356 kernel: EXT4-fs (sda9): resizing filesystem from 553472 to 116605649 blocks Jul 2 11:10:38.862396 coreos-metadata[1513]: Jul 02 11:10:38.737 INFO Fetching https://metadata.packet.net/metadata: Attempt #1 Jul 2 11:10:38.743085 systemd[1]: Starting motdgen.service... Jul 2 11:10:38.862557 extend-filesystems[1528]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 11:10:38.771195 systemd[1]: Starting prepare-helm.service... Jul 2 11:10:38.788008 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 11:10:38.835939 systemd[1]: Starting sshd-keygen.service... Jul 2 11:10:38.854957 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 11:10:38.870350 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 11:10:38.871136 systemd[1]: Starting tcsd.service... Jul 2 11:10:38.883555 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 11:10:38.883950 systemd[1]: Starting update-engine.service... Jul 2 11:10:38.890914 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 11:10:38.892389 jq[1549]: true Jul 2 11:10:38.899338 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Jul 2 11:10:38.900452 systemd[1]: Started dbus.service. Jul 2 11:10:38.909195 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 11:10:38.909288 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 11:10:38.909531 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 11:10:38.909596 systemd[1]: Finished modprobe@drm.service. Jul 2 11:10:38.917545 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 11:10:38.917629 systemd[1]: Finished motdgen.service. Jul 2 11:10:38.925017 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 11:10:38.925100 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 11:10:38.925878 update_engine[1548]: I0702 11:10:38.925282 1548 main.cc:92] Flatcar Update Engine starting Jul 2 11:10:38.929363 update_engine[1548]: I0702 11:10:38.929325 1548 update_check_scheduler.cc:74] Next update check in 5m29s Jul 2 11:10:38.936183 jq[1553]: true Jul 2 11:10:38.936644 systemd[1]: Finished ensure-sysext.service. Jul 2 11:10:38.945174 env[1554]: time="2024-07-02T11:10:38.945154764Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 11:10:38.948435 tar[1551]: linux-amd64/helm Jul 2 11:10:38.950750 systemd[1]: tcsd.service: Skipped due to 'exec-condition'. Jul 2 11:10:38.950836 systemd[1]: Condition check resulted in tcsd.service being skipped. Jul 2 11:10:38.951978 systemd[1]: Started update-engine.service. Jul 2 11:10:38.953426 env[1554]: time="2024-07-02T11:10:38.953405642Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 11:10:38.953499 env[1554]: time="2024-07-02T11:10:38.953490127Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 11:10:38.954106 env[1554]: time="2024-07-02T11:10:38.954090072Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 11:10:38.954106 env[1554]: time="2024-07-02T11:10:38.954105467Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 11:10:38.954224 env[1554]: time="2024-07-02T11:10:38.954214720Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 11:10:38.954250 env[1554]: time="2024-07-02T11:10:38.954224859Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 11:10:38.954250 env[1554]: time="2024-07-02T11:10:38.954232355Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 11:10:38.954250 env[1554]: time="2024-07-02T11:10:38.954237602Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 11:10:38.954303 env[1554]: time="2024-07-02T11:10:38.954289446Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 11:10:38.954440 env[1554]: time="2024-07-02T11:10:38.954407454Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 11:10:38.954513 env[1554]: time="2024-07-02T11:10:38.954475386Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 11:10:38.954513 env[1554]: time="2024-07-02T11:10:38.954484636Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 11:10:38.954513 env[1554]: time="2024-07-02T11:10:38.954510142Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 11:10:38.954581 env[1554]: time="2024-07-02T11:10:38.954517817Z" level=info msg="metadata content store policy set" policy=shared Jul 2 11:10:38.965022 systemd[1]: Started locksmithd.service. Jul 2 11:10:38.970030 env[1554]: time="2024-07-02T11:10:38.970014578Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 11:10:38.970069 env[1554]: time="2024-07-02T11:10:38.970032423Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 11:10:38.970069 env[1554]: time="2024-07-02T11:10:38.970040360Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 11:10:38.970069 env[1554]: time="2024-07-02T11:10:38.970059044Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 11:10:38.971977 env[1554]: time="2024-07-02T11:10:38.970070068Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 11:10:38.971977 env[1554]: time="2024-07-02T11:10:38.970078858Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 11:10:38.971977 env[1554]: time="2024-07-02T11:10:38.970089321Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 11:10:38.971977 env[1554]: time="2024-07-02T11:10:38.970098628Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 11:10:38.971977 env[1554]: time="2024-07-02T11:10:38.970106165Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 11:10:38.971977 env[1554]: time="2024-07-02T11:10:38.970113381Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 11:10:38.971977 env[1554]: time="2024-07-02T11:10:38.970124414Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 11:10:38.971977 env[1554]: time="2024-07-02T11:10:38.970136719Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 11:10:38.971336 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 11:10:38.971351 systemd[1]: Reached target system-config.target. Jul 2 11:10:38.972374 env[1554]: time="2024-07-02T11:10:38.972363535Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 11:10:38.972427 env[1554]: time="2024-07-02T11:10:38.972418533Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 11:10:38.972584 env[1554]: time="2024-07-02T11:10:38.972574879Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 11:10:38.972607 env[1554]: time="2024-07-02T11:10:38.972591357Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 11:10:38.972607 env[1554]: time="2024-07-02T11:10:38.972601631Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 11:10:38.972638 env[1554]: time="2024-07-02T11:10:38.972633555Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 11:10:38.972657 env[1554]: time="2024-07-02T11:10:38.972641560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 11:10:38.972657 env[1554]: time="2024-07-02T11:10:38.972649288Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 11:10:38.972657 env[1554]: time="2024-07-02T11:10:38.972655261Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 11:10:38.972702 env[1554]: time="2024-07-02T11:10:38.972662041Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 11:10:38.972702 env[1554]: time="2024-07-02T11:10:38.972668814Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 11:10:38.972702 env[1554]: time="2024-07-02T11:10:38.972675173Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 11:10:38.972702 env[1554]: time="2024-07-02T11:10:38.972681490Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 11:10:38.972702 env[1554]: time="2024-07-02T11:10:38.972688470Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 11:10:38.972778 env[1554]: time="2024-07-02T11:10:38.972761527Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 11:10:38.972778 env[1554]: time="2024-07-02T11:10:38.972773114Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 11:10:38.972809 env[1554]: time="2024-07-02T11:10:38.972780003Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 11:10:38.972809 env[1554]: time="2024-07-02T11:10:38.972786138Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 11:10:38.972809 env[1554]: time="2024-07-02T11:10:38.972793929Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 11:10:38.972809 env[1554]: time="2024-07-02T11:10:38.972801186Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 11:10:38.972870 env[1554]: time="2024-07-02T11:10:38.972810746Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 11:10:38.972870 env[1554]: time="2024-07-02T11:10:38.972831417Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 11:10:38.972965 env[1554]: time="2024-07-02T11:10:38.972939800Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 11:10:38.976792 env[1554]: time="2024-07-02T11:10:38.972974409Z" level=info msg="Connect containerd service" Jul 2 11:10:38.976792 env[1554]: time="2024-07-02T11:10:38.972994424Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 11:10:38.976792 env[1554]: time="2024-07-02T11:10:38.976287108Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 11:10:38.976792 env[1554]: time="2024-07-02T11:10:38.976385284Z" level=info msg="Start subscribing containerd event" Jul 2 11:10:38.976792 env[1554]: time="2024-07-02T11:10:38.976421986Z" level=info msg="Start recovering state" Jul 2 11:10:38.976792 env[1554]: time="2024-07-02T11:10:38.976440161Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 11:10:38.976792 env[1554]: time="2024-07-02T11:10:38.976473343Z" level=info msg="Start event monitor" Jul 2 11:10:38.976792 env[1554]: time="2024-07-02T11:10:38.976473344Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 11:10:38.976792 env[1554]: time="2024-07-02T11:10:38.976711819Z" level=info msg="containerd successfully booted in 0.031932s" Jul 2 11:10:38.976939 env[1554]: time="2024-07-02T11:10:38.976484399Z" level=info msg="Start snapshots syncer" Jul 2 11:10:38.976939 env[1554]: time="2024-07-02T11:10:38.976834970Z" level=info msg="Start cni network conf syncer for default" Jul 2 11:10:38.976939 env[1554]: time="2024-07-02T11:10:38.976846104Z" level=info msg="Start streaming server" Jul 2 11:10:38.977458 bash[1585]: Updated "/home/core/.ssh/authorized_keys" Jul 2 11:10:38.980712 systemd[1]: Starting systemd-logind.service... Jul 2 11:10:38.987379 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 11:10:38.987401 systemd[1]: Reached target user-config.target. Jul 2 11:10:38.995432 systemd[1]: Started containerd.service. Jul 2 11:10:39.002530 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 11:10:39.008201 systemd-logind[1589]: Watching system buttons on /dev/input/event3 (Power Button) Jul 2 11:10:39.008211 systemd-logind[1589]: Watching system buttons on /dev/input/event2 (Sleep Button) Jul 2 11:10:39.008221 systemd-logind[1589]: Watching system buttons on /dev/input/event0 (HID 0557:2419) Jul 2 11:10:39.008340 systemd-logind[1589]: New seat seat0. Jul 2 11:10:39.012532 systemd[1]: Started systemd-logind.service. Jul 2 11:10:39.023555 locksmithd[1587]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 11:10:39.172662 sshd_keygen[1545]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 11:10:39.184428 systemd[1]: Finished sshd-keygen.service. Jul 2 11:10:39.193326 systemd[1]: Starting issuegen.service... Jul 2 11:10:39.200016 tar[1551]: linux-amd64/LICENSE Jul 2 11:10:39.200050 tar[1551]: linux-amd64/README.md Jul 2 11:10:39.201094 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 11:10:39.201177 systemd[1]: Finished issuegen.service. Jul 2 11:10:39.208597 systemd[1]: Finished prepare-helm.service. Jul 2 11:10:39.217125 systemd[1]: Starting systemd-user-sessions.service... Jul 2 11:10:39.225579 systemd[1]: Finished systemd-user-sessions.service. Jul 2 11:10:39.247144 systemd[1]: Started getty@tty1.service. Jul 2 11:10:39.247269 kernel: EXT4-fs (sda9): resized filesystem to 116605649 Jul 2 11:10:39.256069 systemd[1]: Started serial-getty@ttyS1.service. Jul 2 11:10:39.264509 systemd[1]: Reached target getty.target. Jul 2 11:10:39.275014 extend-filesystems[1528]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required Jul 2 11:10:39.275014 extend-filesystems[1528]: old_desc_blocks = 1, new_desc_blocks = 56 Jul 2 11:10:39.275014 extend-filesystems[1528]: The filesystem on /dev/sda9 is now 116605649 (4k) blocks long. Jul 2 11:10:39.313327 extend-filesystems[1518]: Resized filesystem in /dev/sda9 Jul 2 11:10:39.313327 extend-filesystems[1518]: Found sdb Jul 2 11:10:39.275462 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 11:10:39.275544 systemd[1]: Finished extend-filesystems.service. Jul 2 11:10:39.566407 systemd-networkd[1298]: bond0: Gained IPv6LL Jul 2 11:10:40.079492 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 11:10:40.090598 systemd[1]: Reached target network-online.target. Jul 2 11:10:40.100366 systemd[1]: Starting kubelet.service... Jul 2 11:10:40.708345 kernel: mlx5_core 0000:01:00.0: lag map port 1:1 port 2:2 shared_fdb:0 Jul 2 11:10:40.756099 systemd[1]: Started kubelet.service. Jul 2 11:10:41.284729 kubelet[1617]: E0702 11:10:41.284646 1617 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 11:10:41.285749 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 11:10:41.285823 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 11:10:44.270233 login[1610]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 11:10:44.278487 login[1609]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Jul 2 11:10:44.279614 systemd-logind[1589]: New session 1 of user core. Jul 2 11:10:44.280170 systemd[1]: Created slice user-500.slice. Jul 2 11:10:44.280870 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 11:10:44.282251 systemd-logind[1589]: New session 2 of user core. Jul 2 11:10:44.286366 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 11:10:44.287024 systemd[1]: Starting user@500.service... Jul 2 11:10:44.302877 (systemd)[1639]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:10:44.507162 systemd[1639]: Queued start job for default target default.target. Jul 2 11:10:44.507437 systemd[1639]: Reached target paths.target. Jul 2 11:10:44.507450 systemd[1639]: Reached target sockets.target. Jul 2 11:10:44.507459 systemd[1639]: Reached target timers.target. Jul 2 11:10:44.507466 systemd[1639]: Reached target basic.target. Jul 2 11:10:44.507484 systemd[1639]: Reached target default.target. Jul 2 11:10:44.507499 systemd[1639]: Startup finished in 194ms. Jul 2 11:10:44.507551 systemd[1]: Started user@500.service. Jul 2 11:10:44.508138 systemd[1]: Started session-1.scope. Jul 2 11:10:44.508520 systemd[1]: Started session-2.scope. Jul 2 11:10:44.623673 coreos-metadata[1510]: Jul 02 11:10:44.623 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Jul 2 11:10:44.624463 coreos-metadata[1513]: Jul 02 11:10:44.623 INFO Failed to fetch: error sending request for url (https://metadata.packet.net/metadata): error trying to connect: dns error: failed to lookup address information: Name or service not known Jul 2 11:10:45.624042 coreos-metadata[1513]: Jul 02 11:10:45.623 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Jul 2 11:10:45.624340 coreos-metadata[1510]: Jul 02 11:10:45.623 INFO Fetching https://metadata.packet.net/metadata: Attempt #2 Jul 2 11:10:45.820476 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:2 port 2:2 Jul 2 11:10:45.820632 kernel: mlx5_core 0000:01:00.0: modify lag map port 1:1 port 2:2 Jul 2 11:10:46.699316 coreos-metadata[1513]: Jul 02 11:10:46.699 INFO Fetch successful Jul 2 11:10:46.700134 coreos-metadata[1510]: Jul 02 11:10:46.699 INFO Fetch successful Jul 2 11:10:46.727640 systemd[1]: Finished coreos-metadata.service. Jul 2 11:10:46.728623 systemd[1]: Started packet-phone-home.service. Jul 2 11:10:46.728659 unknown[1510]: wrote ssh authorized keys file for user: core Jul 2 11:10:46.733923 curl[1661]: % Total % Received % Xferd Average Speed Time Time Time Current Jul 2 11:10:46.734082 curl[1661]: Dload Upload Total Spent Left Speed Jul 2 11:10:46.740815 update-ssh-keys[1662]: Updated "/home/core/.ssh/authorized_keys" Jul 2 11:10:46.742003 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Jul 2 11:10:46.742262 systemd-timesyncd[1500]: Contacted time server 173.161.33.165:123 (0.flatcar.pool.ntp.org). Jul 2 11:10:46.742465 systemd-timesyncd[1500]: Initial clock synchronization to Tue 2024-07-02 11:10:46.914696 UTC. Jul 2 11:10:46.743530 systemd[1]: Reached target multi-user.target. Jul 2 11:10:46.747039 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 11:10:46.751106 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 11:10:46.751177 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 11:10:46.751306 systemd[1]: Startup finished in 1.864s (kernel) + 17.059s (initrd) + 14.848s (userspace) = 33.773s. Jul 2 11:10:46.789705 systemd[1]: Created slice system-sshd.slice. Jul 2 11:10:46.790698 systemd[1]: Started sshd@0-147.75.203.5:22-139.178.68.195:39774.service. Jul 2 11:10:46.846704 sshd[1665]: Accepted publickey for core from 139.178.68.195 port 39774 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:10:46.847656 sshd[1665]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:10:46.851096 systemd-logind[1589]: New session 3 of user core. Jul 2 11:10:46.851765 systemd[1]: Started session-3.scope. Jul 2 11:10:46.909659 systemd[1]: Started sshd@1-147.75.203.5:22-139.178.68.195:39790.service. Jul 2 11:10:46.925348 curl[1661]: \u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0\u000d 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 Jul 2 11:10:46.925860 systemd[1]: packet-phone-home.service: Deactivated successfully. Jul 2 11:10:46.943517 sshd[1670]: Accepted publickey for core from 139.178.68.195 port 39790 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:10:46.944235 sshd[1670]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:10:46.946457 systemd-logind[1589]: New session 4 of user core. Jul 2 11:10:46.947135 systemd[1]: Started session-4.scope. Jul 2 11:10:46.997507 sshd[1670]: pam_unix(sshd:session): session closed for user core Jul 2 11:10:46.999970 systemd[1]: sshd@1-147.75.203.5:22-139.178.68.195:39790.service: Deactivated successfully. Jul 2 11:10:47.000482 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 11:10:47.000989 systemd-logind[1589]: Session 4 logged out. Waiting for processes to exit. Jul 2 11:10:47.001904 systemd[1]: Started sshd@2-147.75.203.5:22-139.178.68.195:39806.service. Jul 2 11:10:47.002724 systemd-logind[1589]: Removed session 4. Jul 2 11:10:47.043429 sshd[1676]: Accepted publickey for core from 139.178.68.195 port 39806 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:10:47.046817 sshd[1676]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:10:47.057669 systemd-logind[1589]: New session 5 of user core. Jul 2 11:10:47.061572 systemd[1]: Started session-5.scope. Jul 2 11:10:47.132021 sshd[1676]: pam_unix(sshd:session): session closed for user core Jul 2 11:10:47.141327 systemd[1]: sshd@2-147.75.203.5:22-139.178.68.195:39806.service: Deactivated successfully. Jul 2 11:10:47.143445 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 11:10:47.145535 systemd-logind[1589]: Session 5 logged out. Waiting for processes to exit. Jul 2 11:10:47.148714 systemd[1]: Started sshd@3-147.75.203.5:22-139.178.68.195:39808.service. Jul 2 11:10:47.151698 systemd-logind[1589]: Removed session 5. Jul 2 11:10:47.219059 sshd[1682]: Accepted publickey for core from 139.178.68.195 port 39808 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:10:47.222546 sshd[1682]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:10:47.233467 systemd-logind[1589]: New session 6 of user core. Jul 2 11:10:47.237377 systemd[1]: Started session-6.scope. Jul 2 11:10:47.309132 sshd[1682]: pam_unix(sshd:session): session closed for user core Jul 2 11:10:47.311181 systemd[1]: sshd@3-147.75.203.5:22-139.178.68.195:39808.service: Deactivated successfully. Jul 2 11:10:47.311580 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 11:10:47.311937 systemd-logind[1589]: Session 6 logged out. Waiting for processes to exit. Jul 2 11:10:47.312583 systemd[1]: Started sshd@4-147.75.203.5:22-139.178.68.195:39822.service. Jul 2 11:10:47.313092 systemd-logind[1589]: Removed session 6. Jul 2 11:10:47.344913 sshd[1688]: Accepted publickey for core from 139.178.68.195 port 39822 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:10:47.346121 sshd[1688]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:10:47.350159 systemd-logind[1589]: New session 7 of user core. Jul 2 11:10:47.351728 systemd[1]: Started session-7.scope. Jul 2 11:10:47.439106 sudo[1691]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 11:10:47.439867 sudo[1691]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 11:10:47.457735 dbus-daemon[1516]: \xd0=\x82\xc48V: received setenforce notice (enforcing=1262454944) Jul 2 11:10:47.462896 sudo[1691]: pam_unix(sudo:session): session closed for user root Jul 2 11:10:47.467941 sshd[1688]: pam_unix(sshd:session): session closed for user core Jul 2 11:10:47.477537 systemd[1]: sshd@4-147.75.203.5:22-139.178.68.195:39822.service: Deactivated successfully. Jul 2 11:10:47.479725 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 11:10:47.481894 systemd-logind[1589]: Session 7 logged out. Waiting for processes to exit. Jul 2 11:10:47.485140 systemd[1]: Started sshd@5-147.75.203.5:22-139.178.68.195:39830.service. Jul 2 11:10:47.488067 systemd-logind[1589]: Removed session 7. Jul 2 11:10:47.555816 sshd[1695]: Accepted publickey for core from 139.178.68.195 port 39830 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:10:47.559277 sshd[1695]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:10:47.569976 systemd-logind[1589]: New session 8 of user core. Jul 2 11:10:47.573856 systemd[1]: Started session-8.scope. Jul 2 11:10:47.650055 sudo[1699]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 11:10:47.650181 sudo[1699]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 11:10:47.651894 sudo[1699]: pam_unix(sudo:session): session closed for user root Jul 2 11:10:47.654254 sudo[1698]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 11:10:47.654435 sudo[1698]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 11:10:47.659759 systemd[1]: Stopping audit-rules.service... Jul 2 11:10:47.660000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 11:10:47.660749 auditctl[1702]: No rules Jul 2 11:10:47.660910 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 11:10:47.661000 systemd[1]: Stopped audit-rules.service. Jul 2 11:10:47.661912 systemd[1]: Starting audit-rules.service... Jul 2 11:10:47.666248 kernel: kauditd_printk_skb: 131 callbacks suppressed Jul 2 11:10:47.666280 kernel: audit: type=1305 audit(1719918647.660:184): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 11:10:47.672864 augenrules[1719]: No rules Jul 2 11:10:47.673238 systemd[1]: Finished audit-rules.service. Jul 2 11:10:47.673800 sudo[1698]: pam_unix(sudo:session): session closed for user root Jul 2 11:10:47.674794 sshd[1695]: pam_unix(sshd:session): session closed for user core Jul 2 11:10:47.676898 systemd[1]: sshd@5-147.75.203.5:22-139.178.68.195:39830.service: Deactivated successfully. Jul 2 11:10:47.677395 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 11:10:47.677850 systemd-logind[1589]: Session 8 logged out. Waiting for processes to exit. Jul 2 11:10:47.678595 systemd[1]: Started sshd@6-147.75.203.5:22-139.178.68.195:39834.service. Jul 2 11:10:47.679226 systemd-logind[1589]: Removed session 8. Jul 2 11:10:47.660000 audit[1702]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd56e3f7e0 a2=420 a3=0 items=0 ppid=1 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:47.713829 kernel: audit: type=1300 audit(1719918647.660:184): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd56e3f7e0 a2=420 a3=0 items=0 ppid=1 pid=1702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:47.713910 kernel: audit: type=1327 audit(1719918647.660:184): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 11:10:47.660000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 11:10:47.723587 kernel: audit: type=1131 audit(1719918647.660:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:47.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:47.746545 kernel: audit: type=1130 audit(1719918647.672:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:47.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:47.749352 sshd[1725]: Accepted publickey for core from 139.178.68.195 port 39834 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:10:47.750615 sshd[1725]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:10:47.752964 systemd-logind[1589]: New session 9 of user core. Jul 2 11:10:47.753692 systemd[1]: Started session-9.scope. Jul 2 11:10:47.769505 kernel: audit: type=1106 audit(1719918647.672:187): pid=1698 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:10:47.672000 audit[1698]: USER_END pid=1698 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:10:47.796071 kernel: audit: type=1104 audit(1719918647.672:188): pid=1698 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:10:47.672000 audit[1698]: CRED_DISP pid=1698 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:10:47.802019 sudo[1728]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 11:10:47.802196 sudo[1728]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 11:10:47.674000 audit[1695]: USER_END pid=1695 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:10:47.831505 systemd[1]: Starting docker.service... Jul 2 11:10:47.853046 kernel: audit: type=1106 audit(1719918647.674:189): pid=1695 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:10:47.853102 kernel: audit: type=1104 audit(1719918647.674:190): pid=1695 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:10:47.674000 audit[1695]: CRED_DISP pid=1695 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:10:47.863659 env[1743]: time="2024-07-02T11:10:47.863635854Z" level=info msg="Starting up" Jul 2 11:10:47.864325 env[1743]: time="2024-07-02T11:10:47.864270748Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 11:10:47.864325 env[1743]: time="2024-07-02T11:10:47.864283714Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 11:10:47.864325 env[1743]: time="2024-07-02T11:10:47.864297015Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 11:10:47.864325 env[1743]: time="2024-07-02T11:10:47.864303313Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 11:10:47.865455 env[1743]: time="2024-07-02T11:10:47.865443999Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 11:10:47.865455 env[1743]: time="2024-07-02T11:10:47.865452603Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 11:10:47.865508 env[1743]: time="2024-07-02T11:10:47.865460767Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 11:10:47.865508 env[1743]: time="2024-07-02T11:10:47.865465807Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 11:10:47.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-147.75.203.5:22-139.178.68.195:39830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:47.905540 kernel: audit: type=1131 audit(1719918647.675:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-147.75.203.5:22-139.178.68.195:39830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:47.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.203.5:22-139.178.68.195:39834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:47.749000 audit[1725]: USER_ACCT pid=1725 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:10:47.750000 audit[1725]: CRED_ACQ pid=1725 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:10:47.750000 audit[1725]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6bebe3c0 a2=3 a3=0 items=0 ppid=1 pid=1725 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:47.750000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:10:47.755000 audit[1725]: USER_START pid=1725 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:10:47.756000 audit[1727]: CRED_ACQ pid=1727 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:10:47.801000 audit[1728]: USER_ACCT pid=1728 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:10:47.801000 audit[1728]: CRED_REFR pid=1728 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:10:47.802000 audit[1728]: USER_START pid=1728 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:10:47.940304 env[1743]: time="2024-07-02T11:10:47.940262687Z" level=info msg="Loading containers: start." Jul 2 11:10:47.980000 audit[1790]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:47.980000 audit[1790]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff3efc43a0 a2=0 a3=7fff3efc438c items=0 ppid=1743 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:47.980000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 11:10:47.981000 audit[1792]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:47.981000 audit[1792]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffdeaa727a0 a2=0 a3=7ffdeaa7278c items=0 ppid=1743 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:47.981000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 11:10:47.982000 audit[1794]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:47.982000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc43b48c90 a2=0 a3=7ffc43b48c7c items=0 ppid=1743 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:47.982000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 11:10:47.984000 audit[1796]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:47.984000 audit[1796]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdb0177a20 a2=0 a3=7ffdb0177a0c items=0 ppid=1743 pid=1796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:47.984000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 11:10:47.986000 audit[1798]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:47.986000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc05e86070 a2=0 a3=7ffc05e8605c items=0 ppid=1743 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:47.986000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 11:10:48.028000 audit[1803]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.028000 audit[1803]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe7ecb8250 a2=0 a3=7ffe7ecb823c items=0 ppid=1743 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.028000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 11:10:48.041000 audit[1805]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.041000 audit[1805]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe504e6ee0 a2=0 a3=7ffe504e6ecc items=0 ppid=1743 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.041000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 11:10:48.046000 audit[1807]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.046000 audit[1807]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd70a5f510 a2=0 a3=7ffd70a5f4fc items=0 ppid=1743 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.046000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 11:10:48.051000 audit[1809]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.051000 audit[1809]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd6feb8250 a2=0 a3=7ffd6feb823c items=0 ppid=1743 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.051000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 11:10:48.075000 audit[1813]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1813 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.075000 audit[1813]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffddffd8a80 a2=0 a3=7ffddffd8a6c items=0 ppid=1743 pid=1813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.075000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 11:10:48.078000 audit[1814]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1814 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.078000 audit[1814]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc070cff70 a2=0 a3=7ffc070cff5c items=0 ppid=1743 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.078000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 11:10:48.112343 kernel: Initializing XFRM netlink socket Jul 2 11:10:48.145369 env[1743]: time="2024-07-02T11:10:48.145351772Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 11:10:48.157000 audit[1822]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1822 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.157000 audit[1822]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fffa566d930 a2=0 a3=7fffa566d91c items=0 ppid=1743 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.157000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 11:10:48.171000 audit[1825]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1825 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.171000 audit[1825]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff5fbea550 a2=0 a3=7fff5fbea53c items=0 ppid=1743 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.171000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 11:10:48.173000 audit[1828]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1828 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.173000 audit[1828]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe96554370 a2=0 a3=7ffe9655435c items=0 ppid=1743 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.173000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 11:10:48.174000 audit[1830]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.174000 audit[1830]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe737d2010 a2=0 a3=7ffe737d1ffc items=0 ppid=1743 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.174000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 11:10:48.175000 audit[1832]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.175000 audit[1832]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc042f5b30 a2=0 a3=7ffc042f5b1c items=0 ppid=1743 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.175000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 11:10:48.176000 audit[1834]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.176000 audit[1834]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffefb59a640 a2=0 a3=7ffefb59a62c items=0 ppid=1743 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.176000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 11:10:48.177000 audit[1836]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.177000 audit[1836]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffff6534180 a2=0 a3=7ffff653416c items=0 ppid=1743 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.177000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 11:10:48.182000 audit[1839]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.182000 audit[1839]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff9d919110 a2=0 a3=7fff9d9190fc items=0 ppid=1743 pid=1839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.182000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 11:10:48.183000 audit[1841]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1841 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.183000 audit[1841]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe3fb012d0 a2=0 a3=7ffe3fb012bc items=0 ppid=1743 pid=1841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.183000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 11:10:48.184000 audit[1843]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.184000 audit[1843]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffdbd7f43d0 a2=0 a3=7ffdbd7f43bc items=0 ppid=1743 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.184000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 11:10:48.185000 audit[1845]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.185000 audit[1845]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdbd394be0 a2=0 a3=7ffdbd394bcc items=0 ppid=1743 pid=1845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.185000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 11:10:48.187390 systemd-networkd[1298]: docker0: Link UP Jul 2 11:10:48.189000 audit[1849]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1849 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.189000 audit[1849]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd5e8b0780 a2=0 a3=7ffd5e8b076c items=0 ppid=1743 pid=1849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.189000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 11:10:48.190000 audit[1851]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:10:48.190000 audit[1851]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd5d23d2a0 a2=0 a3=7ffd5d23d28c items=0 ppid=1743 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:10:48.190000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 11:10:48.191694 env[1743]: time="2024-07-02T11:10:48.191677510Z" level=info msg="Loading containers: done." Jul 2 11:10:48.199619 env[1743]: time="2024-07-02T11:10:48.199575106Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 11:10:48.199710 env[1743]: time="2024-07-02T11:10:48.199671027Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 2 11:10:48.199739 env[1743]: time="2024-07-02T11:10:48.199724837Z" level=info msg="Daemon has completed initialization" Jul 2 11:10:48.207048 systemd[1]: Started docker.service. Jul 2 11:10:48.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:48.211061 env[1743]: time="2024-07-02T11:10:48.211007066Z" level=info msg="API listen on /run/docker.sock" Jul 2 11:10:49.267504 env[1554]: time="2024-07-02T11:10:49.267339453Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.2\"" Jul 2 11:10:49.951407 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount254419695.mount: Deactivated successfully. Jul 2 11:10:51.133716 env[1554]: time="2024-07-02T11:10:51.133643589Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:51.135066 env[1554]: time="2024-07-02T11:10:51.135021360Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:56ce0fd9fb532bcb552ddbdbe3064189ce823a71693d97ff7a0a7a4ff6bffbbe,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:51.136183 env[1554]: time="2024-07-02T11:10:51.136147577Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:51.137177 env[1554]: time="2024-07-02T11:10:51.137142117Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:340ab4a1d66a60630a7a298aa0b2576fcd82e51ecdddb751cf61e5d3846fde2d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:51.137667 env[1554]: time="2024-07-02T11:10:51.137623750Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.2\" returns image reference \"sha256:56ce0fd9fb532bcb552ddbdbe3064189ce823a71693d97ff7a0a7a4ff6bffbbe\"" Jul 2 11:10:51.148911 env[1554]: time="2024-07-02T11:10:51.148872306Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.2\"" Jul 2 11:10:51.373232 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 11:10:51.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:51.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:51.373765 systemd[1]: Stopped kubelet.service. Jul 2 11:10:51.377071 systemd[1]: Starting kubelet.service... Jul 2 11:10:51.566117 systemd[1]: Started kubelet.service. Jul 2 11:10:51.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:10:51.606070 kubelet[1924]: E0702 11:10:51.605988 1924 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 11:10:51.607962 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 11:10:51.608036 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 11:10:51.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 11:10:52.721144 env[1554]: time="2024-07-02T11:10:52.721095229Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:52.721748 env[1554]: time="2024-07-02T11:10:52.721694707Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e874818b3caac34f68704eb96bf248d0c8116b1262ab549d45d39dd3dd775974,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:52.722991 env[1554]: time="2024-07-02T11:10:52.722934314Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:52.723951 env[1554]: time="2024-07-02T11:10:52.723916493Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4c412bc1fc585ddeba10d34a02e7507ea787ec2c57256d4c18fd230377ab048e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:52.724468 env[1554]: time="2024-07-02T11:10:52.724413823Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.2\" returns image reference \"sha256:e874818b3caac34f68704eb96bf248d0c8116b1262ab549d45d39dd3dd775974\"" Jul 2 11:10:52.730788 env[1554]: time="2024-07-02T11:10:52.730763295Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.2\"" Jul 2 11:10:53.804574 env[1554]: time="2024-07-02T11:10:53.804515351Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:53.805124 env[1554]: time="2024-07-02T11:10:53.805108753Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7820c83aa139453522e9028341d0d4f23ca2721ec80c7a47425446d11157b940,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:53.806029 env[1554]: time="2024-07-02T11:10:53.806014522Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:53.807083 env[1554]: time="2024-07-02T11:10:53.807069461Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:0ed75a333704f5d315395c6ec04d7af7405715537069b65d40b43ec1c8e030bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:53.807577 env[1554]: time="2024-07-02T11:10:53.807535484Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.2\" returns image reference \"sha256:7820c83aa139453522e9028341d0d4f23ca2721ec80c7a47425446d11157b940\"" Jul 2 11:10:53.812938 env[1554]: time="2024-07-02T11:10:53.812895247Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\"" Jul 2 11:10:54.729602 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2596227503.mount: Deactivated successfully. Jul 2 11:10:55.089014 env[1554]: time="2024-07-02T11:10:55.088952701Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:55.089597 env[1554]: time="2024-07-02T11:10:55.089562478Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:53c535741fb446f6b34d720fdc5748db368ef96771111f3892682e6eab8f3772,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:55.090152 env[1554]: time="2024-07-02T11:10:55.090103537Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:55.090684 env[1554]: time="2024-07-02T11:10:55.090650529Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:8a44c6e094af3dea3de57fa967e201608a358a3bd8b4e3f31ab905bbe4108aec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:55.090977 env[1554]: time="2024-07-02T11:10:55.090941868Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.2\" returns image reference \"sha256:53c535741fb446f6b34d720fdc5748db368ef96771111f3892682e6eab8f3772\"" Jul 2 11:10:55.096544 env[1554]: time="2024-07-02T11:10:55.096498738Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Jul 2 11:10:55.660192 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1401573463.mount: Deactivated successfully. Jul 2 11:10:56.423211 env[1554]: time="2024-07-02T11:10:56.423163280Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:56.423883 env[1554]: time="2024-07-02T11:10:56.423849430Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:56.424748 env[1554]: time="2024-07-02T11:10:56.424692125Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:56.425724 env[1554]: time="2024-07-02T11:10:56.425676313Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:56.426678 env[1554]: time="2024-07-02T11:10:56.426636528Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Jul 2 11:10:56.432923 env[1554]: time="2024-07-02T11:10:56.432878774Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Jul 2 11:10:56.960814 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount419912491.mount: Deactivated successfully. Jul 2 11:10:56.962059 env[1554]: time="2024-07-02T11:10:56.962010867Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:56.962735 env[1554]: time="2024-07-02T11:10:56.962702886Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:56.964062 env[1554]: time="2024-07-02T11:10:56.964019055Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:56.964816 env[1554]: time="2024-07-02T11:10:56.964804301Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:56.965170 env[1554]: time="2024-07-02T11:10:56.965155144Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Jul 2 11:10:56.971080 env[1554]: time="2024-07-02T11:10:56.971065572Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Jul 2 11:10:57.538651 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2225347868.mount: Deactivated successfully. Jul 2 11:10:59.184388 env[1554]: time="2024-07-02T11:10:59.184324572Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:59.185025 env[1554]: time="2024-07-02T11:10:59.184981256Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:59.186199 env[1554]: time="2024-07-02T11:10:59.186153465Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:59.187669 env[1554]: time="2024-07-02T11:10:59.187634705Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:10:59.188064 env[1554]: time="2024-07-02T11:10:59.188015379Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Jul 2 11:11:01.043283 systemd[1]: Stopped kubelet.service. Jul 2 11:11:01.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:11:01.044664 systemd[1]: Starting kubelet.service... Jul 2 11:11:01.048957 kernel: kauditd_printk_skb: 88 callbacks suppressed Jul 2 11:11:01.049025 kernel: audit: type=1130 audit(1719918661.042:230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:11:01.055520 systemd[1]: Reloading. Jul 2 11:11:01.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:11:01.084666 /usr/lib/systemd/system-generators/torcx-generator[2123]: time="2024-07-02T11:11:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 11:11:01.084682 /usr/lib/systemd/system-generators/torcx-generator[2123]: time="2024-07-02T11:11:01Z" level=info msg="torcx already run" Jul 2 11:11:01.126641 kernel: audit: type=1131 audit(1719918661.042:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:11:01.146921 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 11:11:01.146928 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 11:11:01.158186 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 11:11:01.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.316069 kernel: audit: type=1400 audit(1719918661.205:232): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.316119 kernel: audit: type=1400 audit(1719918661.205:233): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.316133 kernel: audit: type=1400 audit(1719918661.205:234): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.372560 kernel: audit: type=1400 audit(1719918661.205:235): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.431179 kernel: audit: type=1400 audit(1719918661.205:236): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.491462 kernel: audit: type=1400 audit(1719918661.205:237): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.552959 kernel: audit: type=1400 audit(1719918661.205:238): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.615440 kernel: audit: type=1400 audit(1719918661.205:239): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.371000 audit: BPF prog-id=40 op=LOAD Jul 2 11:11:01.371000 audit: BPF prog-id=36 op=UNLOAD Jul 2 11:11:01.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.551000 audit: BPF prog-id=41 op=LOAD Jul 2 11:11:01.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit: BPF prog-id=42 op=LOAD Jul 2 11:11:01.678000 audit: BPF prog-id=37 op=UNLOAD Jul 2 11:11:01.678000 audit: BPF prog-id=38 op=UNLOAD Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit: BPF prog-id=43 op=LOAD Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.679000 audit: BPF prog-id=44 op=LOAD Jul 2 11:11:01.679000 audit: BPF prog-id=24 op=UNLOAD Jul 2 11:11:01.679000 audit: BPF prog-id=25 op=UNLOAD Jul 2 11:11:01.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.679000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.679000 audit: BPF prog-id=45 op=LOAD Jul 2 11:11:01.679000 audit: BPF prog-id=26 op=UNLOAD Jul 2 11:11:01.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.680000 audit: BPF prog-id=46 op=LOAD Jul 2 11:11:01.680000 audit: BPF prog-id=34 op=UNLOAD Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit: BPF prog-id=47 op=LOAD Jul 2 11:11:01.681000 audit: BPF prog-id=27 op=UNLOAD Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit: BPF prog-id=48 op=LOAD Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.681000 audit: BPF prog-id=49 op=LOAD Jul 2 11:11:01.681000 audit: BPF prog-id=28 op=UNLOAD Jul 2 11:11:01.681000 audit: BPF prog-id=29 op=UNLOAD Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit: BPF prog-id=50 op=LOAD Jul 2 11:11:01.682000 audit: BPF prog-id=33 op=UNLOAD Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit: BPF prog-id=51 op=LOAD Jul 2 11:11:01.682000 audit: BPF prog-id=30 op=UNLOAD Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit: BPF prog-id=52 op=LOAD Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.682000 audit: BPF prog-id=53 op=LOAD Jul 2 11:11:01.682000 audit: BPF prog-id=31 op=UNLOAD Jul 2 11:11:01.682000 audit: BPF prog-id=32 op=UNLOAD Jul 2 11:11:01.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.683000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:01.683000 audit: BPF prog-id=54 op=LOAD Jul 2 11:11:01.683000 audit: BPF prog-id=35 op=UNLOAD Jul 2 11:11:01.689842 systemd[1]: Started kubelet.service. Jul 2 11:11:01.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:11:01.692041 systemd[1]: Stopping kubelet.service... Jul 2 11:11:01.692887 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 11:11:01.692986 systemd[1]: Stopped kubelet.service. Jul 2 11:11:01.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:11:01.693725 systemd[1]: Starting kubelet.service... Jul 2 11:11:01.900649 systemd[1]: Started kubelet.service. Jul 2 11:11:01.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:11:01.944205 kubelet[2197]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 11:11:01.944205 kubelet[2197]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 11:11:01.944205 kubelet[2197]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 11:11:01.944506 kubelet[2197]: I0702 11:11:01.944219 2197 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 11:11:02.160427 kubelet[2197]: I0702 11:11:02.160351 2197 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 11:11:02.160427 kubelet[2197]: I0702 11:11:02.160367 2197 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 11:11:02.160514 kubelet[2197]: I0702 11:11:02.160502 2197 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 11:11:02.172510 kubelet[2197]: E0702 11:11:02.172469 2197 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://147.75.203.5:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 147.75.203.5:6443: connect: connection refused Jul 2 11:11:02.173067 kubelet[2197]: I0702 11:11:02.173027 2197 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 11:11:02.205020 kubelet[2197]: I0702 11:11:02.205003 2197 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 11:11:02.205187 kubelet[2197]: I0702 11:11:02.205158 2197 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 11:11:02.205335 kubelet[2197]: I0702 11:11:02.205188 2197 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.5-a-18871bf0db","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 11:11:02.205397 kubelet[2197]: I0702 11:11:02.205343 2197 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 11:11:02.205397 kubelet[2197]: I0702 11:11:02.205348 2197 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 11:11:02.205434 kubelet[2197]: I0702 11:11:02.205407 2197 state_mem.go:36] "Initialized new in-memory state store" Jul 2 11:11:02.206077 kubelet[2197]: I0702 11:11:02.206072 2197 kubelet.go:400] "Attempting to sync node with API server" Jul 2 11:11:02.206094 kubelet[2197]: I0702 11:11:02.206080 2197 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 11:11:02.206094 kubelet[2197]: I0702 11:11:02.206092 2197 kubelet.go:312] "Adding apiserver pod source" Jul 2 11:11:02.206125 kubelet[2197]: I0702 11:11:02.206099 2197 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 11:11:02.209231 kubelet[2197]: W0702 11:11:02.209183 2197 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://147.75.203.5:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-18871bf0db&limit=500&resourceVersion=0": dial tcp 147.75.203.5:6443: connect: connection refused Jul 2 11:11:02.209264 kubelet[2197]: E0702 11:11:02.209237 2197 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://147.75.203.5:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.5-a-18871bf0db&limit=500&resourceVersion=0": dial tcp 147.75.203.5:6443: connect: connection refused Jul 2 11:11:02.209338 kubelet[2197]: W0702 11:11:02.209251 2197 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://147.75.203.5:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.203.5:6443: connect: connection refused Jul 2 11:11:02.209338 kubelet[2197]: E0702 11:11:02.209314 2197 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.203.5:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.203.5:6443: connect: connection refused Jul 2 11:11:02.213296 kubelet[2197]: I0702 11:11:02.213255 2197 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 11:11:02.217116 kubelet[2197]: I0702 11:11:02.217077 2197 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 11:11:02.217116 kubelet[2197]: W0702 11:11:02.217107 2197 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 11:11:02.217462 kubelet[2197]: I0702 11:11:02.217412 2197 server.go:1264] "Started kubelet" Jul 2 11:11:02.217462 kubelet[2197]: I0702 11:11:02.217447 2197 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 11:11:02.217547 kubelet[2197]: I0702 11:11:02.217466 2197 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 11:11:02.217634 kubelet[2197]: I0702 11:11:02.217623 2197 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 11:11:02.216000 audit[2197]: AVC avc: denied { mac_admin } for pid=2197 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:02.216000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 11:11:02.216000 audit[2197]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bbc990 a1=c0009570c8 a2=c000bbc960 a3=25 items=0 ppid=1 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:02.216000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 11:11:02.216000 audit[2197]: AVC avc: denied { mac_admin } for pid=2197 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:02.216000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 11:11:02.216000 audit[2197]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c2ce80 a1=c0009570e0 a2=c000bbca20 a3=25 items=0 ppid=1 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:02.216000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 11:11:02.218353 kubelet[2197]: I0702 11:11:02.218029 2197 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 11:11:02.218353 kubelet[2197]: I0702 11:11:02.218055 2197 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 11:11:02.218353 kubelet[2197]: I0702 11:11:02.218091 2197 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 11:11:02.218353 kubelet[2197]: I0702 11:11:02.218120 2197 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 11:11:02.218353 kubelet[2197]: E0702 11:11:02.218139 2197 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.5-a-18871bf0db\" not found" Jul 2 11:11:02.218353 kubelet[2197]: I0702 11:11:02.218149 2197 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 11:11:02.218353 kubelet[2197]: I0702 11:11:02.218181 2197 reconciler.go:26] "Reconciler: start to sync state" Jul 2 11:11:02.218353 kubelet[2197]: I0702 11:11:02.218219 2197 server.go:455] "Adding debug handlers to kubelet server" Jul 2 11:11:02.218353 kubelet[2197]: E0702 11:11:02.218279 2197 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.203.5:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-18871bf0db?timeout=10s\": dial tcp 147.75.203.5:6443: connect: connection refused" interval="200ms" Jul 2 11:11:02.218622 kubelet[2197]: W0702 11:11:02.218333 2197 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://147.75.203.5:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.203.5:6443: connect: connection refused Jul 2 11:11:02.218622 kubelet[2197]: E0702 11:11:02.218373 2197 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.75.203.5:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.203.5:6443: connect: connection refused Jul 2 11:11:02.218622 kubelet[2197]: I0702 11:11:02.218470 2197 factory.go:221] Registration of the systemd container factory successfully Jul 2 11:11:02.218622 kubelet[2197]: I0702 11:11:02.218518 2197 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 11:11:02.219049 kubelet[2197]: I0702 11:11:02.219038 2197 factory.go:221] Registration of the containerd container factory successfully Jul 2 11:11:02.256868 kubelet[2197]: E0702 11:11:02.256835 2197 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 11:11:02.256000 audit[2221]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:02.256000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc4d194760 a2=0 a3=7ffc4d19474c items=0 ppid=2197 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:02.256000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 11:11:02.259424 kubelet[2197]: E0702 11:11:02.259264 2197 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://147.75.203.5:6443/api/v1/namespaces/default/events\": dial tcp 147.75.203.5:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.5-a-18871bf0db.17de60e928087f1c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.5-a-18871bf0db,UID:ci-3510.3.5-a-18871bf0db,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.5-a-18871bf0db,},FirstTimestamp:2024-07-02 11:11:02.217400092 +0000 UTC m=+0.314022293,LastTimestamp:2024-07-02 11:11:02.217400092 +0000 UTC m=+0.314022293,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.5-a-18871bf0db,}" Jul 2 11:11:02.258000 audit[2224]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:02.258000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8b3db7e0 a2=0 a3=7ffd8b3db7cc items=0 ppid=2197 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:02.258000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 11:11:02.260000 audit[2226]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:02.260000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffecb195df0 a2=0 a3=7ffecb195ddc items=0 ppid=2197 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:02.260000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 11:11:02.263000 audit[2228]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:02.263000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc1b8c2880 a2=0 a3=7ffc1b8c286c items=0 ppid=2197 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:02.263000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 11:11:02.272000 audit[2231]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:02.272000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd4931bdd0 a2=0 a3=7ffd4931bdbc items=0 ppid=2197 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:02.272000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 11:11:02.274046 kubelet[2197]: I0702 11:11:02.273973 2197 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 11:11:02.273000 audit[2232]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=2232 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:02.273000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdcc229130 a2=0 a3=7ffdcc22911c items=0 ppid=2197 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:02.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 11:11:02.275309 kubelet[2197]: I0702 11:11:02.275251 2197 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 11:11:02.275309 kubelet[2197]: I0702 11:11:02.275294 2197 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 11:11:02.275518 kubelet[2197]: I0702 11:11:02.275316 2197 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 11:11:02.275518 kubelet[2197]: E0702 11:11:02.275369 2197 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 11:11:02.275886 kubelet[2197]: W0702 11:11:02.275816 2197 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://147.75.203.5:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.203.5:6443: connect: connection refused Jul 2 11:11:02.275978 kubelet[2197]: E0702 11:11:02.275892 2197 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://147.75.203.5:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.203.5:6443: connect: connection refused Jul 2 11:11:02.275000 audit[2235]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:02.275000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7f27c910 a2=0 a3=7ffc7f27c8fc items=0 ppid=2197 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:02.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 11:11:02.275000 audit[2234]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:02.275000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf0b055f0 a2=0 a3=10e3 items=0 ppid=2197 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:02.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 11:11:02.276000 audit[2236]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:02.276000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc59ad4910 a2=0 a3=7ffc59ad48fc items=0 ppid=2197 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:02.276000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 11:11:02.276000 audit[2237]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:02.276000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc2ff87690 a2=0 a3=7ffc2ff8767c items=0 ppid=2197 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:02.276000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 11:11:02.277000 audit[2238]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:02.277000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcb34b5f00 a2=0 a3=7ffcb34b5eec items=0 ppid=2197 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:02.277000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 11:11:02.277000 audit[2239]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:02.277000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd3268e310 a2=0 a3=7ffd3268e2fc items=0 ppid=2197 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:02.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 11:11:02.352815 kubelet[2197]: I0702 11:11:02.352727 2197 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.353413 kubelet[2197]: E0702 11:11:02.353325 2197 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.203.5:6443/api/v1/nodes\": dial tcp 147.75.203.5:6443: connect: connection refused" node="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.353953 kubelet[2197]: I0702 11:11:02.353874 2197 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 11:11:02.353953 kubelet[2197]: I0702 11:11:02.353919 2197 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 11:11:02.353953 kubelet[2197]: I0702 11:11:02.353964 2197 state_mem.go:36] "Initialized new in-memory state store" Jul 2 11:11:02.356208 kubelet[2197]: I0702 11:11:02.356125 2197 policy_none.go:49] "None policy: Start" Jul 2 11:11:02.357429 kubelet[2197]: I0702 11:11:02.357350 2197 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 11:11:02.357429 kubelet[2197]: I0702 11:11:02.357400 2197 state_mem.go:35] "Initializing new in-memory state store" Jul 2 11:11:02.368896 systemd[1]: Created slice kubepods.slice. Jul 2 11:11:02.375546 kubelet[2197]: E0702 11:11:02.375454 2197 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Jul 2 11:11:02.379707 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 11:11:02.402248 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 11:11:02.405200 kubelet[2197]: I0702 11:11:02.405121 2197 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 11:11:02.403000 audit[2197]: AVC avc: denied { mac_admin } for pid=2197 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:02.403000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 11:11:02.403000 audit[2197]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fbcf30 a1=c000d439b0 a2=c000fbcf00 a3=25 items=0 ppid=1 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:02.403000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 11:11:02.405908 kubelet[2197]: I0702 11:11:02.405248 2197 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 11:11:02.405908 kubelet[2197]: I0702 11:11:02.405525 2197 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 11:11:02.405908 kubelet[2197]: I0702 11:11:02.405807 2197 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 11:11:02.407645 kubelet[2197]: E0702 11:11:02.407559 2197 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.5-a-18871bf0db\" not found" Jul 2 11:11:02.419225 kubelet[2197]: E0702 11:11:02.419038 2197 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.203.5:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-18871bf0db?timeout=10s\": dial tcp 147.75.203.5:6443: connect: connection refused" interval="400ms" Jul 2 11:11:02.557532 kubelet[2197]: I0702 11:11:02.557433 2197 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.558294 kubelet[2197]: E0702 11:11:02.558149 2197 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.203.5:6443/api/v1/nodes\": dial tcp 147.75.203.5:6443: connect: connection refused" node="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.576710 kubelet[2197]: I0702 11:11:02.576584 2197 topology_manager.go:215] "Topology Admit Handler" podUID="eee190d73243aef9c6641479ca6e655e" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.580530 kubelet[2197]: I0702 11:11:02.580447 2197 topology_manager.go:215] "Topology Admit Handler" podUID="81bf11361e246cb13148802e14234811" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.583980 kubelet[2197]: I0702 11:11:02.583925 2197 topology_manager.go:215] "Topology Admit Handler" podUID="bcdfab2a8d1565c7bbda64e080bc0886" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.595986 systemd[1]: Created slice kubepods-burstable-podeee190d73243aef9c6641479ca6e655e.slice. Jul 2 11:11:02.616657 systemd[1]: Created slice kubepods-burstable-pod81bf11361e246cb13148802e14234811.slice. Jul 2 11:11:02.620424 kubelet[2197]: I0702 11:11:02.620381 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/81bf11361e246cb13148802e14234811-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.5-a-18871bf0db\" (UID: \"81bf11361e246cb13148802e14234811\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.620424 kubelet[2197]: I0702 11:11:02.620403 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bcdfab2a8d1565c7bbda64e080bc0886-ca-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-18871bf0db\" (UID: \"bcdfab2a8d1565c7bbda64e080bc0886\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.620424 kubelet[2197]: I0702 11:11:02.620419 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/bcdfab2a8d1565c7bbda64e080bc0886-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.5-a-18871bf0db\" (UID: \"bcdfab2a8d1565c7bbda64e080bc0886\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.620513 kubelet[2197]: I0702 11:11:02.620431 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/81bf11361e246cb13148802e14234811-k8s-certs\") pod \"kube-apiserver-ci-3510.3.5-a-18871bf0db\" (UID: \"81bf11361e246cb13148802e14234811\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.620513 kubelet[2197]: I0702 11:11:02.620444 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/81bf11361e246cb13148802e14234811-ca-certs\") pod \"kube-apiserver-ci-3510.3.5-a-18871bf0db\" (UID: \"81bf11361e246cb13148802e14234811\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.620513 kubelet[2197]: I0702 11:11:02.620470 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/bcdfab2a8d1565c7bbda64e080bc0886-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.5-a-18871bf0db\" (UID: \"bcdfab2a8d1565c7bbda64e080bc0886\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.620513 kubelet[2197]: I0702 11:11:02.620505 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bcdfab2a8d1565c7bbda64e080bc0886-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-18871bf0db\" (UID: \"bcdfab2a8d1565c7bbda64e080bc0886\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.620611 kubelet[2197]: I0702 11:11:02.620521 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bcdfab2a8d1565c7bbda64e080bc0886-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.5-a-18871bf0db\" (UID: \"bcdfab2a8d1565c7bbda64e080bc0886\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.620611 kubelet[2197]: I0702 11:11:02.620534 2197 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/eee190d73243aef9c6641479ca6e655e-kubeconfig\") pod \"kube-scheduler-ci-3510.3.5-a-18871bf0db\" (UID: \"eee190d73243aef9c6641479ca6e655e\") " pod="kube-system/kube-scheduler-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.630205 systemd[1]: Created slice kubepods-burstable-podbcdfab2a8d1565c7bbda64e080bc0886.slice. Jul 2 11:11:02.820778 kubelet[2197]: E0702 11:11:02.820549 2197 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://147.75.203.5:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.5-a-18871bf0db?timeout=10s\": dial tcp 147.75.203.5:6443: connect: connection refused" interval="800ms" Jul 2 11:11:02.917142 env[1554]: time="2024-07-02T11:11:02.916985014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.5-a-18871bf0db,Uid:eee190d73243aef9c6641479ca6e655e,Namespace:kube-system,Attempt:0,}" Jul 2 11:11:02.930119 env[1554]: time="2024-07-02T11:11:02.929997236Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.5-a-18871bf0db,Uid:81bf11361e246cb13148802e14234811,Namespace:kube-system,Attempt:0,}" Jul 2 11:11:02.933306 env[1554]: time="2024-07-02T11:11:02.933180371Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.5-a-18871bf0db,Uid:bcdfab2a8d1565c7bbda64e080bc0886,Namespace:kube-system,Attempt:0,}" Jul 2 11:11:02.962038 kubelet[2197]: I0702 11:11:02.961944 2197 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:02.962780 kubelet[2197]: E0702 11:11:02.962599 2197 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://147.75.203.5:6443/api/v1/nodes\": dial tcp 147.75.203.5:6443: connect: connection refused" node="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:03.159905 kubelet[2197]: W0702 11:11:03.159779 2197 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://147.75.203.5:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.203.5:6443: connect: connection refused Jul 2 11:11:03.159905 kubelet[2197]: E0702 11:11:03.159866 2197 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://147.75.203.5:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 147.75.203.5:6443: connect: connection refused Jul 2 11:11:03.271629 kubelet[2197]: W0702 11:11:03.271472 2197 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://147.75.203.5:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.203.5:6443: connect: connection refused Jul 2 11:11:03.271629 kubelet[2197]: E0702 11:11:03.271609 2197 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://147.75.203.5:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 147.75.203.5:6443: connect: connection refused Jul 2 11:11:03.430797 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount719069801.mount: Deactivated successfully. Jul 2 11:11:03.432252 env[1554]: time="2024-07-02T11:11:03.432206858Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:03.433380 env[1554]: time="2024-07-02T11:11:03.433365470Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:03.433934 env[1554]: time="2024-07-02T11:11:03.433921018Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:03.434586 env[1554]: time="2024-07-02T11:11:03.434574111Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:03.434910 env[1554]: time="2024-07-02T11:11:03.434900127Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:03.435790 env[1554]: time="2024-07-02T11:11:03.435776774Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:03.437054 env[1554]: time="2024-07-02T11:11:03.437035303Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:03.437515 env[1554]: time="2024-07-02T11:11:03.437494824Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:03.438476 env[1554]: time="2024-07-02T11:11:03.438465038Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:03.439263 env[1554]: time="2024-07-02T11:11:03.439251533Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:03.440149 env[1554]: time="2024-07-02T11:11:03.440137436Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:03.441326 env[1554]: time="2024-07-02T11:11:03.441282405Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:03.443660 env[1554]: time="2024-07-02T11:11:03.443599513Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:11:03.443660 env[1554]: time="2024-07-02T11:11:03.443619213Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:11:03.443660 env[1554]: time="2024-07-02T11:11:03.443626471Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:11:03.443734 env[1554]: time="2024-07-02T11:11:03.443692629Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/48cb3d7842b66e7808605f64b749f2f0d08118c7f5bdd0f04631b586e7f336c0 pid=2247 runtime=io.containerd.runc.v2 Jul 2 11:11:03.447031 env[1554]: time="2024-07-02T11:11:03.446995482Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:11:03.447031 env[1554]: time="2024-07-02T11:11:03.447018525Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:11:03.447031 env[1554]: time="2024-07-02T11:11:03.447026506Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:11:03.447201 env[1554]: time="2024-07-02T11:11:03.447104523Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/253942596300f0ac3df76c67c79741a191b7142e68d7747205be96b82be48f96 pid=2274 runtime=io.containerd.runc.v2 Jul 2 11:11:03.447238 env[1554]: time="2024-07-02T11:11:03.447216771Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:11:03.447273 env[1554]: time="2024-07-02T11:11:03.447236161Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:11:03.447273 env[1554]: time="2024-07-02T11:11:03.447243755Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:11:03.447342 env[1554]: time="2024-07-02T11:11:03.447309191Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dc856b7c201cd5fac023bee6ef495561e47f12f73324a6b28b832e27e9f6788d pid=2277 runtime=io.containerd.runc.v2 Jul 2 11:11:03.450469 systemd[1]: Started cri-containerd-48cb3d7842b66e7808605f64b749f2f0d08118c7f5bdd0f04631b586e7f336c0.scope. Jul 2 11:11:03.453788 systemd[1]: Started cri-containerd-253942596300f0ac3df76c67c79741a191b7142e68d7747205be96b82be48f96.scope. Jul 2 11:11:03.454600 systemd[1]: Started cri-containerd-dc856b7c201cd5fac023bee6ef495561e47f12f73324a6b28b832e27e9f6788d.scope. Jul 2 11:11:03.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit: BPF prog-id=55 op=LOAD Jul 2 11:11:03.455000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2247 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438636233643738343262363665373830383630356636346237343966 Jul 2 11:11:03.455000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2247 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438636233643738343262363665373830383630356636346237343966 Jul 2 11:11:03.455000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.455000 audit: BPF prog-id=56 op=LOAD Jul 2 11:11:03.455000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001d28a0 items=0 ppid=2247 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438636233643738343262363665373830383630356636346237343966 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit: BPF prog-id=57 op=LOAD Jul 2 11:11:03.456000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001d28e8 items=0 ppid=2247 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438636233643738343262363665373830383630356636346237343966 Jul 2 11:11:03.456000 audit: BPF prog-id=57 op=UNLOAD Jul 2 11:11:03.456000 audit: BPF prog-id=56 op=UNLOAD Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.456000 audit: BPF prog-id=58 op=LOAD Jul 2 11:11:03.456000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001d2cf8 items=0 ppid=2247 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438636233643738343262363665373830383630356636346237343966 Jul 2 11:11:03.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit: BPF prog-id=59 op=LOAD Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2274 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333934323539363330306630616333646637366336376337393734 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2274 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333934323539363330306630616333646637366336376337393734 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit: BPF prog-id=60 op=LOAD Jul 2 11:11:03.458000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a3600 items=0 ppid=2274 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333934323539363330306630616333646637366336376337393734 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit: BPF prog-id=61 op=LOAD Jul 2 11:11:03.458000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a3648 items=0 ppid=2274 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333934323539363330306630616333646637366336376337393734 Jul 2 11:11:03.458000 audit: BPF prog-id=61 op=UNLOAD Jul 2 11:11:03.458000 audit: BPF prog-id=60 op=UNLOAD Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { perfmon } for pid=2297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit[2297]: AVC avc: denied { bpf } for pid=2297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.458000 audit: BPF prog-id=62 op=LOAD Jul 2 11:11:03.458000 audit[2297]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a3a58 items=0 ppid=2274 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235333934323539363330306630616333646637366336376337393734 Jul 2 11:11:03.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit: BPF prog-id=63 op=LOAD Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2277 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383536623763323031636435666163303233626565366566343935 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2277 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383536623763323031636435666163303233626565366566343935 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit: BPF prog-id=64 op=LOAD Jul 2 11:11:03.459000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000269ce0 items=0 ppid=2277 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383536623763323031636435666163303233626565366566343935 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit: BPF prog-id=65 op=LOAD Jul 2 11:11:03.459000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000269d28 items=0 ppid=2277 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383536623763323031636435666163303233626565366566343935 Jul 2 11:11:03.459000 audit: BPF prog-id=65 op=UNLOAD Jul 2 11:11:03.459000 audit: BPF prog-id=64 op=UNLOAD Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { perfmon } for pid=2298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit[2298]: AVC avc: denied { bpf } for pid=2298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.459000 audit: BPF prog-id=66 op=LOAD Jul 2 11:11:03.459000 audit[2298]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ea138 items=0 ppid=2277 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463383536623763323031636435666163303233626565366566343935 Jul 2 11:11:03.474238 env[1554]: time="2024-07-02T11:11:03.474195913Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.5-a-18871bf0db,Uid:eee190d73243aef9c6641479ca6e655e,Namespace:kube-system,Attempt:0,} returns sandbox id \"48cb3d7842b66e7808605f64b749f2f0d08118c7f5bdd0f04631b586e7f336c0\"" Jul 2 11:11:03.476119 env[1554]: time="2024-07-02T11:11:03.476100636Z" level=info msg="CreateContainer within sandbox \"48cb3d7842b66e7808605f64b749f2f0d08118c7f5bdd0f04631b586e7f336c0\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 2 11:11:03.476839 env[1554]: time="2024-07-02T11:11:03.476813097Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.5-a-18871bf0db,Uid:bcdfab2a8d1565c7bbda64e080bc0886,Namespace:kube-system,Attempt:0,} returns sandbox id \"253942596300f0ac3df76c67c79741a191b7142e68d7747205be96b82be48f96\"" Jul 2 11:11:03.476973 env[1554]: time="2024-07-02T11:11:03.476961534Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.5-a-18871bf0db,Uid:81bf11361e246cb13148802e14234811,Namespace:kube-system,Attempt:0,} returns sandbox id \"dc856b7c201cd5fac023bee6ef495561e47f12f73324a6b28b832e27e9f6788d\"" Jul 2 11:11:03.477929 env[1554]: time="2024-07-02T11:11:03.477916993Z" level=info msg="CreateContainer within sandbox \"253942596300f0ac3df76c67c79741a191b7142e68d7747205be96b82be48f96\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 2 11:11:03.478001 env[1554]: time="2024-07-02T11:11:03.477984801Z" level=info msg="CreateContainer within sandbox \"dc856b7c201cd5fac023bee6ef495561e47f12f73324a6b28b832e27e9f6788d\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 2 11:11:03.500085 kubelet[2197]: W0702 11:11:03.499930 2197 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://147.75.203.5:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.203.5:6443: connect: connection refused Jul 2 11:11:03.500392 kubelet[2197]: E0702 11:11:03.500125 2197 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://147.75.203.5:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 147.75.203.5:6443: connect: connection refused Jul 2 11:11:03.502195 env[1554]: time="2024-07-02T11:11:03.502114235Z" level=info msg="CreateContainer within sandbox \"48cb3d7842b66e7808605f64b749f2f0d08118c7f5bdd0f04631b586e7f336c0\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"3b4a4b04ab5e5955958ccd15c887df1f45276833452bb139db26a970836365a8\"" Jul 2 11:11:03.503450 env[1554]: time="2024-07-02T11:11:03.503350819Z" level=info msg="StartContainer for \"3b4a4b04ab5e5955958ccd15c887df1f45276833452bb139db26a970836365a8\"" Jul 2 11:11:03.512352 env[1554]: time="2024-07-02T11:11:03.512236413Z" level=info msg="CreateContainer within sandbox \"253942596300f0ac3df76c67c79741a191b7142e68d7747205be96b82be48f96\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"90c5cf12ce3324b7e90b6816661bf2b66a8ebf3842b747af2a72a0bd26487a21\"" Jul 2 11:11:03.512905 env[1554]: time="2024-07-02T11:11:03.512817988Z" level=info msg="CreateContainer within sandbox \"dc856b7c201cd5fac023bee6ef495561e47f12f73324a6b28b832e27e9f6788d\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"570873c963f2d217002a5242a6fe8ca29b6a1d72f952eeeb31af534c69c593f4\"" Jul 2 11:11:03.513191 env[1554]: time="2024-07-02T11:11:03.513121830Z" level=info msg="StartContainer for \"90c5cf12ce3324b7e90b6816661bf2b66a8ebf3842b747af2a72a0bd26487a21\"" Jul 2 11:11:03.513681 env[1554]: time="2024-07-02T11:11:03.513606461Z" level=info msg="StartContainer for \"570873c963f2d217002a5242a6fe8ca29b6a1d72f952eeeb31af534c69c593f4\"" Jul 2 11:11:03.539776 systemd[1]: Started cri-containerd-3b4a4b04ab5e5955958ccd15c887df1f45276833452bb139db26a970836365a8.scope. Jul 2 11:11:03.547030 systemd[1]: Started cri-containerd-570873c963f2d217002a5242a6fe8ca29b6a1d72f952eeeb31af534c69c593f4.scope. Jul 2 11:11:03.548204 systemd[1]: Started cri-containerd-90c5cf12ce3324b7e90b6816661bf2b66a8ebf3842b747af2a72a0bd26487a21.scope. Jul 2 11:11:03.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.553000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.553000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.553000 audit: BPF prog-id=67 op=LOAD Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2247 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362346134623034616235653539353539353863636431356338383764 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2247 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362346134623034616235653539353539353863636431356338383764 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit: BPF prog-id=68 op=LOAD Jul 2 11:11:03.554000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000317b80 items=0 ppid=2247 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362346134623034616235653539353539353863636431356338383764 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit: BPF prog-id=69 op=LOAD Jul 2 11:11:03.554000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000317bc8 items=0 ppid=2247 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362346134623034616235653539353539353863636431356338383764 Jul 2 11:11:03.554000 audit: BPF prog-id=69 op=UNLOAD Jul 2 11:11:03.554000 audit: BPF prog-id=68 op=UNLOAD Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { perfmon } for pid=2373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit[2373]: AVC avc: denied { bpf } for pid=2373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.554000 audit: BPF prog-id=70 op=LOAD Jul 2 11:11:03.554000 audit[2373]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000317fd8 items=0 ppid=2247 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362346134623034616235653539353539353863636431356338383764 Jul 2 11:11:03.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.557000 audit: BPF prog-id=71 op=LOAD Jul 2 11:11:03.557000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.557000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2277 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.557000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537303837336339363366326432313730303261353234326136666538 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2277 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537303837336339363366326432313730303261353234326136666538 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit: BPF prog-id=72 op=LOAD Jul 2 11:11:03.558000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000292cb0 items=0 ppid=2277 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537303837336339363366326432313730303261353234326136666538 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit: BPF prog-id=73 op=LOAD Jul 2 11:11:03.558000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000292cf8 items=0 ppid=2277 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537303837336339363366326432313730303261353234326136666538 Jul 2 11:11:03.558000 audit: BPF prog-id=73 op=UNLOAD Jul 2 11:11:03.558000 audit: BPF prog-id=72 op=UNLOAD Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.558000 audit: BPF prog-id=74 op=LOAD Jul 2 11:11:03.558000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000293108 items=0 ppid=2277 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.558000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537303837336339363366326432313730303261353234326136666538 Jul 2 11:11:03.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit: BPF prog-id=75 op=LOAD Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2274 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930633563663132636533333234623765393062363831363636316266 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2274 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930633563663132636533333234623765393062363831363636316266 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit: BPF prog-id=76 op=LOAD Jul 2 11:11:03.559000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d2020 items=0 ppid=2274 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930633563663132636533333234623765393062363831363636316266 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit: BPF prog-id=77 op=LOAD Jul 2 11:11:03.559000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d2068 items=0 ppid=2274 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930633563663132636533333234623765393062363831363636316266 Jul 2 11:11:03.559000 audit: BPF prog-id=77 op=UNLOAD Jul 2 11:11:03.559000 audit: BPF prog-id=76 op=UNLOAD Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { perfmon } for pid=2391 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit[2391]: AVC avc: denied { bpf } for pid=2391 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:03.559000 audit: BPF prog-id=78 op=LOAD Jul 2 11:11:03.559000 audit[2391]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d2478 items=0 ppid=2274 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:03.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930633563663132636533333234623765393062363831363636316266 Jul 2 11:11:03.576711 env[1554]: time="2024-07-02T11:11:03.576686073Z" level=info msg="StartContainer for \"3b4a4b04ab5e5955958ccd15c887df1f45276833452bb139db26a970836365a8\" returns successfully" Jul 2 11:11:03.579245 env[1554]: time="2024-07-02T11:11:03.579220510Z" level=info msg="StartContainer for \"570873c963f2d217002a5242a6fe8ca29b6a1d72f952eeeb31af534c69c593f4\" returns successfully" Jul 2 11:11:03.580542 env[1554]: time="2024-07-02T11:11:03.580525839Z" level=info msg="StartContainer for \"90c5cf12ce3324b7e90b6816661bf2b66a8ebf3842b747af2a72a0bd26487a21\" returns successfully" Jul 2 11:11:03.765059 kubelet[2197]: I0702 11:11:03.765016 2197 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:04.080000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:11:04.080000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:11:04.080000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c005ba1ae0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:11:04.080000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c005c821e0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:11:04.080000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:11:04.080000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:11:04.080000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:11:04.080000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00597a060 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:11:04.080000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:11:04.080000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:11:04.080000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c005ba1b40 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:11:04.080000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:11:04.081000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:11:04.081000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5b a1=c00597a7e0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:11:04.081000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:11:04.081000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:11:04.081000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5f a1=c0046973b0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:11:04.081000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:11:04.090220 kubelet[2197]: E0702 11:11:04.090179 2197 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.5-a-18871bf0db\" not found" node="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:04.168000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:11:04.168000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:11:04.168000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00058a1e0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:11:04.168000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0005c9aa0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:11:04.168000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:11:04.168000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:11:04.191296 kubelet[2197]: I0702 11:11:04.191279 2197 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:04.207600 kubelet[2197]: I0702 11:11:04.207538 2197 apiserver.go:52] "Watching apiserver" Jul 2 11:11:04.218532 kubelet[2197]: I0702 11:11:04.218486 2197 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 11:11:04.326982 kubelet[2197]: E0702 11:11:04.326878 2197 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.5-a-18871bf0db\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:04.326982 kubelet[2197]: E0702 11:11:04.326915 2197 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.5-a-18871bf0db\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:04.327417 kubelet[2197]: E0702 11:11:04.326986 2197 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.5-a-18871bf0db\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:05.312098 kubelet[2197]: W0702 11:11:05.312023 2197 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 11:11:05.312098 kubelet[2197]: W0702 11:11:05.312065 2197 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 11:11:06.880633 systemd[1]: Reloading. Jul 2 11:11:06.930206 /usr/lib/systemd/system-generators/torcx-generator[2535]: time="2024-07-02T11:11:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 11:11:06.930227 /usr/lib/systemd/system-generators/torcx-generator[2535]: time="2024-07-02T11:11:06Z" level=info msg="torcx already run" Jul 2 11:11:06.982843 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 11:11:06.982851 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 11:11:06.994231 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 11:11:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.073820 kernel: kauditd_printk_skb: 581 callbacks suppressed Jul 2 11:11:07.073924 kernel: audit: type=1400 audit(1719918667.047:538): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.200100 kernel: audit: type=1400 audit(1719918667.047:539): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.200179 kernel: audit: type=1400 audit(1719918667.047:540): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.327418 kernel: audit: type=1400 audit(1719918667.047:541): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.327451 kernel: audit: type=1400 audit(1719918667.047:542): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.390874 kernel: audit: type=1400 audit(1719918667.047:543): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.454245 kernel: audit: type=1400 audit(1719918667.047:544): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.517560 kernel: audit: type=1400 audit(1719918667.047:545): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.580979 kernel: audit: type=1400 audit(1719918667.047:546): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.644012 kernel: audit: type=1400 audit(1719918667.198:547): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.198000 audit: BPF prog-id=79 op=LOAD Jul 2 11:11:07.198000 audit: BPF prog-id=40 op=UNLOAD Jul 2 11:11:07.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.323000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:11:07.323000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001138820 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:11:07.323000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:11:07.323000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:11:07.323000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001138860 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:11:07.323000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:11:07.324000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:11:07.324000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011388a0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:11:07.324000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:11:07.324000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:11:07.324000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0011fc3a0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:11:07.324000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:11:07.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.326000 audit: BPF prog-id=80 op=LOAD Jul 2 11:11:07.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.452000 audit: BPF prog-id=81 op=LOAD Jul 2 11:11:07.452000 audit: BPF prog-id=41 op=UNLOAD Jul 2 11:11:07.453000 audit: BPF prog-id=42 op=UNLOAD Jul 2 11:11:07.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.580000 audit: BPF prog-id=82 op=LOAD Jul 2 11:11:07.580000 audit: BPF prog-id=63 op=UNLOAD Jul 2 11:11:07.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.580000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.580000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.706000 audit: BPF prog-id=83 op=LOAD Jul 2 11:11:07.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.706000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.706000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.706000 audit: BPF prog-id=84 op=LOAD Jul 2 11:11:07.706000 audit: BPF prog-id=43 op=UNLOAD Jul 2 11:11:07.706000 audit: BPF prog-id=44 op=UNLOAD Jul 2 11:11:07.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.707000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.707000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.707000 audit: BPF prog-id=85 op=LOAD Jul 2 11:11:07.707000 audit: BPF prog-id=45 op=UNLOAD Jul 2 11:11:07.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.708000 audit: BPF prog-id=86 op=LOAD Jul 2 11:11:07.708000 audit: BPF prog-id=46 op=UNLOAD Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit: BPF prog-id=87 op=LOAD Jul 2 11:11:07.709000 audit: BPF prog-id=59 op=UNLOAD Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.709000 audit: BPF prog-id=88 op=LOAD Jul 2 11:11:07.709000 audit: BPF prog-id=67 op=UNLOAD Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit: BPF prog-id=89 op=LOAD Jul 2 11:11:07.710000 audit: BPF prog-id=47 op=UNLOAD Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit: BPF prog-id=90 op=LOAD Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit: BPF prog-id=91 op=LOAD Jul 2 11:11:07.710000 audit: BPF prog-id=48 op=UNLOAD Jul 2 11:11:07.710000 audit: BPF prog-id=49 op=UNLOAD Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.710000 audit: BPF prog-id=92 op=LOAD Jul 2 11:11:07.710000 audit: BPF prog-id=50 op=UNLOAD Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit: BPF prog-id=93 op=LOAD Jul 2 11:11:07.711000 audit: BPF prog-id=51 op=UNLOAD Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit: BPF prog-id=94 op=LOAD Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit: BPF prog-id=95 op=LOAD Jul 2 11:11:07.711000 audit: BPF prog-id=52 op=UNLOAD Jul 2 11:11:07.711000 audit: BPF prog-id=53 op=UNLOAD Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit: BPF prog-id=96 op=LOAD Jul 2 11:11:07.711000 audit: BPF prog-id=54 op=UNLOAD Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.711000 audit: BPF prog-id=97 op=LOAD Jul 2 11:11:07.711000 audit: BPF prog-id=75 op=UNLOAD Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit: BPF prog-id=98 op=LOAD Jul 2 11:11:07.713000 audit: BPF prog-id=55 op=UNLOAD Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:07.713000 audit: BPF prog-id=99 op=LOAD Jul 2 11:11:07.713000 audit: BPF prog-id=71 op=UNLOAD Jul 2 11:11:07.720038 systemd[1]: Stopping kubelet.service... Jul 2 11:11:07.746736 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 11:11:07.746993 systemd[1]: Stopped kubelet.service. Jul 2 11:11:07.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:11:07.749385 systemd[1]: Starting kubelet.service... Jul 2 11:11:07.958336 systemd[1]: Started kubelet.service. Jul 2 11:11:07.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:11:07.972000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 11:11:07.972000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0010408c0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:11:07.972000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:11:07.985212 kubelet[2596]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 11:11:07.985212 kubelet[2596]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 11:11:07.985212 kubelet[2596]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 11:11:07.985442 kubelet[2596]: I0702 11:11:07.985214 2596 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 11:11:07.987792 kubelet[2596]: I0702 11:11:07.987744 2596 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Jul 2 11:11:07.987792 kubelet[2596]: I0702 11:11:07.987755 2596 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 11:11:07.987863 kubelet[2596]: I0702 11:11:07.987843 2596 server.go:927] "Client rotation is on, will bootstrap in background" Jul 2 11:11:07.988565 kubelet[2596]: I0702 11:11:07.988527 2596 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 2 11:11:07.989125 kubelet[2596]: I0702 11:11:07.989084 2596 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 11:11:08.009097 kubelet[2596]: I0702 11:11:08.009047 2596 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 11:11:08.009255 kubelet[2596]: I0702 11:11:08.009229 2596 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 11:11:08.009417 kubelet[2596]: I0702 11:11:08.009259 2596 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.5-a-18871bf0db","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 11:11:08.009417 kubelet[2596]: I0702 11:11:08.009395 2596 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 11:11:08.009417 kubelet[2596]: I0702 11:11:08.009403 2596 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 11:11:08.009538 kubelet[2596]: I0702 11:11:08.009428 2596 state_mem.go:36] "Initialized new in-memory state store" Jul 2 11:11:08.009538 kubelet[2596]: I0702 11:11:08.009482 2596 kubelet.go:400] "Attempting to sync node with API server" Jul 2 11:11:08.009538 kubelet[2596]: I0702 11:11:08.009490 2596 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 11:11:08.009538 kubelet[2596]: I0702 11:11:08.009504 2596 kubelet.go:312] "Adding apiserver pod source" Jul 2 11:11:08.009538 kubelet[2596]: I0702 11:11:08.009514 2596 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 11:11:08.010032 kubelet[2596]: I0702 11:11:08.009985 2596 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 11:11:08.010102 kubelet[2596]: I0702 11:11:08.010095 2596 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 11:11:08.010389 kubelet[2596]: I0702 11:11:08.010349 2596 server.go:1264] "Started kubelet" Jul 2 11:11:08.010430 kubelet[2596]: I0702 11:11:08.010391 2596 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 11:11:08.010430 kubelet[2596]: I0702 11:11:08.010394 2596 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 11:11:08.010539 kubelet[2596]: I0702 11:11:08.010531 2596 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 11:11:08.010000 audit[2596]: AVC avc: denied { mac_admin } for pid=2596 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:08.010000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 11:11:08.010000 audit[2596]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f14870 a1=c00005bd70 a2=c000f14840 a3=25 items=0 ppid=1 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:08.010000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 11:11:08.011806 kubelet[2596]: I0702 11:11:08.011486 2596 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 11:11:08.011806 kubelet[2596]: I0702 11:11:08.011560 2596 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 11:11:08.011806 kubelet[2596]: I0702 11:11:08.011592 2596 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 11:11:08.011806 kubelet[2596]: I0702 11:11:08.011710 2596 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 11:11:08.011806 kubelet[2596]: I0702 11:11:08.011732 2596 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Jul 2 11:11:08.011991 kubelet[2596]: I0702 11:11:08.011936 2596 reconciler.go:26] "Reconciler: start to sync state" Jul 2 11:11:08.012160 kubelet[2596]: I0702 11:11:08.012144 2596 server.go:455] "Adding debug handlers to kubelet server" Jul 2 11:11:08.012339 kubelet[2596]: E0702 11:11:08.012327 2596 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 11:11:08.010000 audit[2596]: AVC avc: denied { mac_admin } for pid=2596 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:08.010000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 11:11:08.010000 audit[2596]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f246a0 a1=c00005be00 a2=c000f14900 a3=25 items=0 ppid=1 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:08.010000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 11:11:08.012975 kubelet[2596]: I0702 11:11:08.012732 2596 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 11:11:08.020162 kubelet[2596]: I0702 11:11:08.020143 2596 factory.go:221] Registration of the containerd container factory successfully Jul 2 11:11:08.020162 kubelet[2596]: I0702 11:11:08.020159 2596 factory.go:221] Registration of the systemd container factory successfully Jul 2 11:11:08.024087 kubelet[2596]: I0702 11:11:08.024051 2596 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 11:11:08.024808 kubelet[2596]: I0702 11:11:08.024794 2596 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 11:11:08.024858 kubelet[2596]: I0702 11:11:08.024813 2596 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 11:11:08.024858 kubelet[2596]: I0702 11:11:08.024824 2596 kubelet.go:2337] "Starting kubelet main sync loop" Jul 2 11:11:08.024942 kubelet[2596]: E0702 11:11:08.024851 2596 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 11:11:08.035493 kubelet[2596]: I0702 11:11:08.035435 2596 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 11:11:08.035493 kubelet[2596]: I0702 11:11:08.035449 2596 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 11:11:08.035493 kubelet[2596]: I0702 11:11:08.035461 2596 state_mem.go:36] "Initialized new in-memory state store" Jul 2 11:11:08.035611 kubelet[2596]: I0702 11:11:08.035556 2596 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 2 11:11:08.035611 kubelet[2596]: I0702 11:11:08.035564 2596 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 2 11:11:08.035611 kubelet[2596]: I0702 11:11:08.035576 2596 policy_none.go:49] "None policy: Start" Jul 2 11:11:08.035903 kubelet[2596]: I0702 11:11:08.035894 2596 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 11:11:08.035934 kubelet[2596]: I0702 11:11:08.035908 2596 state_mem.go:35] "Initializing new in-memory state store" Jul 2 11:11:08.035993 kubelet[2596]: I0702 11:11:08.035986 2596 state_mem.go:75] "Updated machine memory state" Jul 2 11:11:08.038119 kubelet[2596]: I0702 11:11:08.038108 2596 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 11:11:08.036000 audit[2596]: AVC avc: denied { mac_admin } for pid=2596 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:08.036000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 11:11:08.036000 audit[2596]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0013a65d0 a1=c00128b128 a2=c0013a65a0 a3=25 items=0 ppid=1 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:08.036000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 11:11:08.038359 kubelet[2596]: I0702 11:11:08.038142 2596 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 11:11:08.038359 kubelet[2596]: I0702 11:11:08.038231 2596 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Jul 2 11:11:08.038359 kubelet[2596]: I0702 11:11:08.038310 2596 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 11:11:08.113676 kubelet[2596]: I0702 11:11:08.113632 2596 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:08.119934 kubelet[2596]: I0702 11:11:08.119917 2596 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:08.120007 kubelet[2596]: I0702 11:11:08.119971 2596 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:08.125003 kubelet[2596]: I0702 11:11:08.124983 2596 topology_manager.go:215] "Topology Admit Handler" podUID="81bf11361e246cb13148802e14234811" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:08.125088 kubelet[2596]: I0702 11:11:08.125051 2596 topology_manager.go:215] "Topology Admit Handler" podUID="bcdfab2a8d1565c7bbda64e080bc0886" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:08.125136 kubelet[2596]: I0702 11:11:08.125106 2596 topology_manager.go:215] "Topology Admit Handler" podUID="eee190d73243aef9c6641479ca6e655e" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:08.128719 kubelet[2596]: W0702 11:11:08.128703 2596 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 11:11:08.128779 kubelet[2596]: E0702 11:11:08.128741 2596 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.5-a-18871bf0db\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:08.128779 kubelet[2596]: W0702 11:11:08.128703 2596 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 11:11:08.129350 kubelet[2596]: W0702 11:11:08.129342 2596 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 11:11:08.129385 kubelet[2596]: E0702 11:11:08.129368 2596 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.5-a-18871bf0db\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:08.313549 kubelet[2596]: I0702 11:11:08.313471 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/eee190d73243aef9c6641479ca6e655e-kubeconfig\") pod \"kube-scheduler-ci-3510.3.5-a-18871bf0db\" (UID: \"eee190d73243aef9c6641479ca6e655e\") " pod="kube-system/kube-scheduler-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:08.313549 kubelet[2596]: I0702 11:11:08.313497 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/81bf11361e246cb13148802e14234811-ca-certs\") pod \"kube-apiserver-ci-3510.3.5-a-18871bf0db\" (UID: \"81bf11361e246cb13148802e14234811\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:08.313549 kubelet[2596]: I0702 11:11:08.313511 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/81bf11361e246cb13148802e14234811-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.5-a-18871bf0db\" (UID: \"81bf11361e246cb13148802e14234811\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:08.313549 kubelet[2596]: I0702 11:11:08.313525 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/bcdfab2a8d1565c7bbda64e080bc0886-ca-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-18871bf0db\" (UID: \"bcdfab2a8d1565c7bbda64e080bc0886\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:08.313549 kubelet[2596]: I0702 11:11:08.313539 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/bcdfab2a8d1565c7bbda64e080bc0886-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.5-a-18871bf0db\" (UID: \"bcdfab2a8d1565c7bbda64e080bc0886\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:08.313779 kubelet[2596]: I0702 11:11:08.313549 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/bcdfab2a8d1565c7bbda64e080bc0886-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.5-a-18871bf0db\" (UID: \"bcdfab2a8d1565c7bbda64e080bc0886\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:08.313779 kubelet[2596]: I0702 11:11:08.313560 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/bcdfab2a8d1565c7bbda64e080bc0886-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.5-a-18871bf0db\" (UID: \"bcdfab2a8d1565c7bbda64e080bc0886\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:08.313779 kubelet[2596]: I0702 11:11:08.313576 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/81bf11361e246cb13148802e14234811-k8s-certs\") pod \"kube-apiserver-ci-3510.3.5-a-18871bf0db\" (UID: \"81bf11361e246cb13148802e14234811\") " pod="kube-system/kube-apiserver-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:08.313779 kubelet[2596]: I0702 11:11:08.313587 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/bcdfab2a8d1565c7bbda64e080bc0886-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.5-a-18871bf0db\" (UID: \"bcdfab2a8d1565c7bbda64e080bc0886\") " pod="kube-system/kube-controller-manager-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:09.010895 kubelet[2596]: I0702 11:11:09.010874 2596 apiserver.go:52] "Watching apiserver" Jul 2 11:11:09.033107 kubelet[2596]: W0702 11:11:09.033085 2596 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 11:11:09.033230 kubelet[2596]: E0702 11:11:09.033131 2596 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.5-a-18871bf0db\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:09.033858 kubelet[2596]: W0702 11:11:09.033808 2596 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Jul 2 11:11:09.033858 kubelet[2596]: E0702 11:11:09.033849 2596 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.5-a-18871bf0db\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.5-a-18871bf0db" Jul 2 11:11:09.045557 kubelet[2596]: I0702 11:11:09.045508 2596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.5-a-18871bf0db" podStartSLOduration=4.045475677 podStartE2EDuration="4.045475677s" podCreationTimestamp="2024-07-02 11:11:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 11:11:09.045302818 +0000 UTC m=+1.082981656" watchObservedRunningTime="2024-07-02 11:11:09.045475677 +0000 UTC m=+1.083154523" Jul 2 11:11:09.051584 kubelet[2596]: I0702 11:11:09.051527 2596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.5-a-18871bf0db" podStartSLOduration=1.051511794 podStartE2EDuration="1.051511794s" podCreationTimestamp="2024-07-02 11:11:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 11:11:09.05137046 +0000 UTC m=+1.089049293" watchObservedRunningTime="2024-07-02 11:11:09.051511794 +0000 UTC m=+1.089190622" Jul 2 11:11:09.055878 kubelet[2596]: I0702 11:11:09.055849 2596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.5-a-18871bf0db" podStartSLOduration=4.055841182 podStartE2EDuration="4.055841182s" podCreationTimestamp="2024-07-02 11:11:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 11:11:09.055814793 +0000 UTC m=+1.093493626" watchObservedRunningTime="2024-07-02 11:11:09.055841182 +0000 UTC m=+1.093520010" Jul 2 11:11:09.112117 kubelet[2596]: I0702 11:11:09.112085 2596 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Jul 2 11:11:11.438564 sudo[1728]: pam_unix(sudo:session): session closed for user root Jul 2 11:11:11.437000 audit[1728]: USER_END pid=1728 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:11:11.437000 audit[1728]: CRED_DISP pid=1728 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 11:11:11.439429 sshd[1725]: pam_unix(sshd:session): session closed for user core Jul 2 11:11:11.438000 audit[1725]: USER_END pid=1725 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:11:11.438000 audit[1725]: CRED_DISP pid=1725 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:11:11.440970 systemd[1]: sshd@6-147.75.203.5:22-139.178.68.195:39834.service: Deactivated successfully. Jul 2 11:11:11.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-147.75.203.5:22-139.178.68.195:39834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:11:11.441448 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 11:11:11.441533 systemd[1]: session-9.scope: Consumed 3.361s CPU time. Jul 2 11:11:11.441894 systemd-logind[1589]: Session 9 logged out. Waiting for processes to exit. Jul 2 11:11:11.442404 systemd-logind[1589]: Removed session 9. Jul 2 11:11:21.122104 kubelet[2596]: I0702 11:11:21.122024 2596 topology_manager.go:215] "Topology Admit Handler" podUID="eaf3049b-792c-4fb7-ad91-6b7dcc5e904c" podNamespace="kube-system" podName="kube-proxy-2vgft" Jul 2 11:11:21.128480 systemd[1]: Created slice kubepods-besteffort-podeaf3049b_792c_4fb7_ad91_6b7dcc5e904c.slice. Jul 2 11:11:21.143374 kubelet[2596]: I0702 11:11:21.143330 2596 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 2 11:11:21.143593 env[1554]: time="2024-07-02T11:11:21.143568941Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 11:11:21.143801 kubelet[2596]: I0702 11:11:21.143695 2596 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 2 11:11:21.286078 kubelet[2596]: I0702 11:11:21.286035 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-brlrt\" (UniqueName: \"kubernetes.io/projected/eaf3049b-792c-4fb7-ad91-6b7dcc5e904c-kube-api-access-brlrt\") pod \"kube-proxy-2vgft\" (UID: \"eaf3049b-792c-4fb7-ad91-6b7dcc5e904c\") " pod="kube-system/kube-proxy-2vgft" Jul 2 11:11:21.286261 kubelet[2596]: I0702 11:11:21.286091 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/eaf3049b-792c-4fb7-ad91-6b7dcc5e904c-kube-proxy\") pod \"kube-proxy-2vgft\" (UID: \"eaf3049b-792c-4fb7-ad91-6b7dcc5e904c\") " pod="kube-system/kube-proxy-2vgft" Jul 2 11:11:21.286261 kubelet[2596]: I0702 11:11:21.286123 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/eaf3049b-792c-4fb7-ad91-6b7dcc5e904c-xtables-lock\") pod \"kube-proxy-2vgft\" (UID: \"eaf3049b-792c-4fb7-ad91-6b7dcc5e904c\") " pod="kube-system/kube-proxy-2vgft" Jul 2 11:11:21.286261 kubelet[2596]: I0702 11:11:21.286150 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/eaf3049b-792c-4fb7-ad91-6b7dcc5e904c-lib-modules\") pod \"kube-proxy-2vgft\" (UID: \"eaf3049b-792c-4fb7-ad91-6b7dcc5e904c\") " pod="kube-system/kube-proxy-2vgft" Jul 2 11:11:21.298262 kubelet[2596]: I0702 11:11:21.298232 2596 topology_manager.go:215] "Topology Admit Handler" podUID="1e3dc6af-cb37-4532-a088-0f15f37e1512" podNamespace="tigera-operator" podName="tigera-operator-76ff79f7fd-gl5x6" Jul 2 11:11:21.302672 systemd[1]: Created slice kubepods-besteffort-pod1e3dc6af_cb37_4532_a088_0f15f37e1512.slice. Jul 2 11:11:21.443728 env[1554]: time="2024-07-02T11:11:21.443476464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2vgft,Uid:eaf3049b-792c-4fb7-ad91-6b7dcc5e904c,Namespace:kube-system,Attempt:0,}" Jul 2 11:11:21.469474 env[1554]: time="2024-07-02T11:11:21.469256506Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:11:21.469474 env[1554]: time="2024-07-02T11:11:21.469391576Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:11:21.469474 env[1554]: time="2024-07-02T11:11:21.469429685Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:11:21.469962 env[1554]: time="2024-07-02T11:11:21.469852554Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f598d439420dcc33f1eb28e495f5e43ad31c29f1dca9c8f4f9877ed871069b1f pid=2759 runtime=io.containerd.runc.v2 Jul 2 11:11:21.487833 kubelet[2596]: I0702 11:11:21.487761 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ct6zw\" (UniqueName: \"kubernetes.io/projected/1e3dc6af-cb37-4532-a088-0f15f37e1512-kube-api-access-ct6zw\") pod \"tigera-operator-76ff79f7fd-gl5x6\" (UID: \"1e3dc6af-cb37-4532-a088-0f15f37e1512\") " pod="tigera-operator/tigera-operator-76ff79f7fd-gl5x6" Jul 2 11:11:21.488126 kubelet[2596]: I0702 11:11:21.487969 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/1e3dc6af-cb37-4532-a088-0f15f37e1512-var-lib-calico\") pod \"tigera-operator-76ff79f7fd-gl5x6\" (UID: \"1e3dc6af-cb37-4532-a088-0f15f37e1512\") " pod="tigera-operator/tigera-operator-76ff79f7fd-gl5x6" Jul 2 11:11:21.501885 systemd[1]: Started cri-containerd-f598d439420dcc33f1eb28e495f5e43ad31c29f1dca9c8f4f9877ed871069b1f.scope. Jul 2 11:11:21.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.544615 kernel: kauditd_printk_skb: 268 callbacks suppressed Jul 2 11:11:21.544669 kernel: audit: type=1400 audit(1719918681.516:797): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.604719 env[1554]: time="2024-07-02T11:11:21.604667076Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76ff79f7fd-gl5x6,Uid:1e3dc6af-cb37-4532-a088-0f15f37e1512,Namespace:tigera-operator,Attempt:0,}" Jul 2 11:11:21.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.607270 kernel: audit: type=1400 audit(1719918681.516:798): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.611270 env[1554]: time="2024-07-02T11:11:21.611238918Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:11:21.611270 env[1554]: time="2024-07-02T11:11:21.611258489Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:11:21.611345 env[1554]: time="2024-07-02T11:11:21.611270836Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:11:21.611383 env[1554]: time="2024-07-02T11:11:21.611337908Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0001b6b3babd9b69a41edfce0ff54eef70ffc76afa072d7e4a865d7966eaf7bb pid=2794 runtime=io.containerd.runc.v2 Jul 2 11:11:21.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.674524 systemd[1]: Started cri-containerd-0001b6b3babd9b69a41edfce0ff54eef70ffc76afa072d7e4a865d7966eaf7bb.scope. Jul 2 11:11:21.733860 kernel: audit: type=1400 audit(1719918681.516:799): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.733908 kernel: audit: type=1400 audit(1719918681.516:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.797977 kernel: audit: type=1400 audit(1719918681.516:801): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.861979 kernel: audit: type=1400 audit(1719918681.516:802): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.926146 kernel: audit: type=1400 audit(1719918681.516:803): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.516000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.054270 kernel: audit: type=1400 audit(1719918681.516:804): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.054306 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Jul 2 11:11:22.054323 kernel: audit: type=1400 audit(1719918681.516:805): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.516000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.668000 audit: BPF prog-id=100 op=LOAD Jul 2 11:11:21.669000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.669000 audit[2768]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2759 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:21.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635393864343339343230646363333366316562323865343935663565 Jul 2 11:11:21.669000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.669000 audit[2768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2759 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:21.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635393864343339343230646363333366316562323865343935663565 Jul 2 11:11:21.669000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.669000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.669000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.669000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.669000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.669000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.669000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.669000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.669000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.669000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.669000 audit: BPF prog-id=101 op=LOAD Jul 2 11:11:21.669000 audit[2768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a0670 items=0 ppid=2759 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:21.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635393864343339343230646363333366316562323865343935663565 Jul 2 11:11:21.796000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.796000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.796000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.796000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.796000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.796000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.796000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.796000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.860000 audit: BPF prog-id=102 op=LOAD Jul 2 11:11:21.860000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.860000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2794 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:21.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030303162366233626162643962363961343165646663653066663534 Jul 2 11:11:21.860000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.860000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2794 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:21.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030303162366233626162643962363961343165646663653066663534 Jul 2 11:11:21.860000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.860000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.860000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.860000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.860000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.860000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.860000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.860000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.860000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.796000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.796000 audit: BPF prog-id=103 op=LOAD Jul 2 11:11:21.796000 audit[2768]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a06b8 items=0 ppid=2759 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:21.860000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:21.860000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c8470 items=0 ppid=2794 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:21.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635393864343339343230646363333366316562323865343935663565 Jul 2 11:11:22.143000 audit: BPF prog-id=103 op=UNLOAD Jul 2 11:11:22.143000 audit: BPF prog-id=101 op=UNLOAD Jul 2 11:11:21.860000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030303162366233626162643962363961343165646663653066663534 Jul 2 11:11:22.143000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2768]: AVC avc: denied { perfmon } for pid=2768 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit: BPF prog-id=105 op=LOAD Jul 2 11:11:22.143000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c84b8 items=0 ppid=2794 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030303162366233626162643962363961343165646663653066663534 Jul 2 11:11:22.143000 audit: BPF prog-id=105 op=UNLOAD Jul 2 11:11:22.143000 audit: BPF prog-id=104 op=UNLOAD Jul 2 11:11:22.143000 audit[2768]: AVC avc: denied { bpf } for pid=2768 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit: BPF prog-id=106 op=LOAD Jul 2 11:11:22.143000 audit[2768]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a0ac8 items=0 ppid=2759 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635393864343339343230646363333366316562323865343935663565 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { perfmon } for pid=2802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit[2802]: AVC avc: denied { bpf } for pid=2802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.143000 audit: BPF prog-id=107 op=LOAD Jul 2 11:11:22.143000 audit[2802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c88c8 items=0 ppid=2794 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030303162366233626162643962363961343165646663653066663534 Jul 2 11:11:22.149720 env[1554]: time="2024-07-02T11:11:22.149695339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2vgft,Uid:eaf3049b-792c-4fb7-ad91-6b7dcc5e904c,Namespace:kube-system,Attempt:0,} returns sandbox id \"f598d439420dcc33f1eb28e495f5e43ad31c29f1dca9c8f4f9877ed871069b1f\"" Jul 2 11:11:22.150952 env[1554]: time="2024-07-02T11:11:22.150937829Z" level=info msg="CreateContainer within sandbox \"f598d439420dcc33f1eb28e495f5e43ad31c29f1dca9c8f4f9877ed871069b1f\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 11:11:22.161950 env[1554]: time="2024-07-02T11:11:22.161922546Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76ff79f7fd-gl5x6,Uid:1e3dc6af-cb37-4532-a088-0f15f37e1512,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"0001b6b3babd9b69a41edfce0ff54eef70ffc76afa072d7e4a865d7966eaf7bb\"" Jul 2 11:11:22.162712 env[1554]: time="2024-07-02T11:11:22.162696127Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\"" Jul 2 11:11:22.173158 env[1554]: time="2024-07-02T11:11:22.173117979Z" level=info msg="CreateContainer within sandbox \"f598d439420dcc33f1eb28e495f5e43ad31c29f1dca9c8f4f9877ed871069b1f\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"c7870bf950a7689812e4b5f911e0d8ed50b113f84d905d08826db0bf6aad01f2\"" Jul 2 11:11:22.173365 env[1554]: time="2024-07-02T11:11:22.173320880Z" level=info msg="StartContainer for \"c7870bf950a7689812e4b5f911e0d8ed50b113f84d905d08826db0bf6aad01f2\"" Jul 2 11:11:22.181131 systemd[1]: Started cri-containerd-c7870bf950a7689812e4b5f911e0d8ed50b113f84d905d08826db0bf6aad01f2.scope. Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc40210bca8 items=0 ppid=2759 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337383730626639353061373638393831326534623566393131653064 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit: BPF prog-id=108 op=LOAD Jul 2 11:11:22.187000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00027e1f8 items=0 ppid=2759 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337383730626639353061373638393831326534623566393131653064 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.187000 audit: BPF prog-id=109 op=LOAD Jul 2 11:11:22.187000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00027e248 items=0 ppid=2759 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337383730626639353061373638393831326534623566393131653064 Jul 2 11:11:22.187000 audit: BPF prog-id=109 op=UNLOAD Jul 2 11:11:22.187000 audit: BPF prog-id=108 op=UNLOAD Jul 2 11:11:22.188000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.188000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.188000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.188000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.188000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.188000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.188000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.188000 audit[2840]: AVC avc: denied { perfmon } for pid=2840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.188000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.188000 audit[2840]: AVC avc: denied { bpf } for pid=2840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:22.188000 audit: BPF prog-id=110 op=LOAD Jul 2 11:11:22.188000 audit[2840]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00027e2d8 items=0 ppid=2759 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337383730626639353061373638393831326534623566393131653064 Jul 2 11:11:22.194990 env[1554]: time="2024-07-02T11:11:22.194960694Z" level=info msg="StartContainer for \"c7870bf950a7689812e4b5f911e0d8ed50b113f84d905d08826db0bf6aad01f2\" returns successfully" Jul 2 11:11:22.229000 audit[2903]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2903 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.229000 audit[2903]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef7571860 a2=0 a3=7ffef757184c items=0 ppid=2850 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 11:11:22.229000 audit[2904]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.229000 audit[2904]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff63551a40 a2=0 a3=7fff63551a2c items=0 ppid=2850 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.229000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 11:11:22.230000 audit[2905]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.230000 audit[2905]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc16f1c300 a2=0 a3=7ffc16f1c2ec items=0 ppid=2850 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 11:11:22.230000 audit[2906]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2906 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.230000 audit[2906]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffab1ba0e0 a2=0 a3=7fffab1ba0cc items=0 ppid=2850 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 11:11:22.230000 audit[2907]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.230000 audit[2907]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff04359fb0 a2=0 a3=7fff04359f9c items=0 ppid=2850 pid=2907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 11:11:22.230000 audit[2908]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2908 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.230000 audit[2908]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6211d060 a2=0 a3=7ffe6211d04c items=0 ppid=2850 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 11:11:22.333000 audit[2909]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.333000 audit[2909]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe34dce4f0 a2=0 a3=7ffe34dce4dc items=0 ppid=2850 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 11:11:22.339000 audit[2911]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2911 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.339000 audit[2911]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffd7136100 a2=0 a3=7fffd71360ec items=0 ppid=2850 pid=2911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.339000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 11:11:22.341000 audit[2914]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.341000 audit[2914]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffa5484240 a2=0 a3=7fffa548422c items=0 ppid=2850 pid=2914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.341000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 11:11:22.342000 audit[2915]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.342000 audit[2915]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffefea66840 a2=0 a3=7ffefea6682c items=0 ppid=2850 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.342000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 11:11:22.343000 audit[2917]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.343000 audit[2917]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffffb03a110 a2=0 a3=7ffffb03a0fc items=0 ppid=2850 pid=2917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 11:11:22.343000 audit[2918]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.343000 audit[2918]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe76951950 a2=0 a3=7ffe7695193c items=0 ppid=2850 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 11:11:22.345000 audit[2920]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2920 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.345000 audit[2920]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd6632baa0 a2=0 a3=7ffd6632ba8c items=0 ppid=2850 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 11:11:22.347000 audit[2923]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.347000 audit[2923]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd24cc1750 a2=0 a3=7ffd24cc173c items=0 ppid=2850 pid=2923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.347000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 11:11:22.347000 audit[2924]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.347000 audit[2924]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffed1eb6c0 a2=0 a3=7fffed1eb6ac items=0 ppid=2850 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.347000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 11:11:22.349000 audit[2926]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.349000 audit[2926]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff0542bba0 a2=0 a3=7fff0542bb8c items=0 ppid=2850 pid=2926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.349000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 11:11:22.349000 audit[2927]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2927 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.349000 audit[2927]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc005cb940 a2=0 a3=7ffc005cb92c items=0 ppid=2850 pid=2927 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.349000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 11:11:22.351000 audit[2929]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2929 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.351000 audit[2929]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3796af50 a2=0 a3=7ffe3796af3c items=0 ppid=2850 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.351000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 11:11:22.353000 audit[2932]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.353000 audit[2932]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe73354500 a2=0 a3=7ffe733544ec items=0 ppid=2850 pid=2932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.353000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 11:11:22.355000 audit[2935]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.355000 audit[2935]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce1b91b50 a2=0 a3=7ffce1b91b3c items=0 ppid=2850 pid=2935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 11:11:22.356000 audit[2936]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2936 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.356000 audit[2936]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffdda1187d0 a2=0 a3=7ffdda1187bc items=0 ppid=2850 pid=2936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 11:11:22.357000 audit[2938]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2938 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.357000 audit[2938]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe0b57b460 a2=0 a3=7ffe0b57b44c items=0 ppid=2850 pid=2938 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 11:11:22.359000 audit[2941]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2941 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.359000 audit[2941]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe054a2070 a2=0 a3=7ffe054a205c items=0 ppid=2850 pid=2941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 11:11:22.360000 audit[2942]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2942 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.360000 audit[2942]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbc5a7210 a2=0 a3=7ffdbc5a71fc items=0 ppid=2850 pid=2942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.360000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 11:11:22.362000 audit[2944]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2944 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 11:11:22.362000 audit[2944]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc0377c1b0 a2=0 a3=7ffc0377c19c items=0 ppid=2850 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.362000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 11:11:22.392000 audit[2950]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:22.392000 audit[2950]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc6cbd8e20 a2=0 a3=7ffc6cbd8e0c items=0 ppid=2850 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.392000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:22.399000 audit[2950]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:22.399000 audit[2950]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc6cbd8e20 a2=0 a3=7ffc6cbd8e0c items=0 ppid=2850 pid=2950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.399000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:22.402000 audit[2955]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2955 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.402000 audit[2955]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffca2175c50 a2=0 a3=7ffca2175c3c items=0 ppid=2850 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.402000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 11:11:22.405000 audit[2957]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2957 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.405000 audit[2957]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe69533310 a2=0 a3=7ffe695332fc items=0 ppid=2850 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.405000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 11:11:22.410000 audit[2960]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2960 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.410000 audit[2960]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc4f063550 a2=0 a3=7ffc4f06353c items=0 ppid=2850 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 11:11:22.412000 audit[2961]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2961 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.412000 audit[2961]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc18ef8850 a2=0 a3=7ffc18ef883c items=0 ppid=2850 pid=2961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.412000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 11:11:22.415000 audit[2963]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.415000 audit[2963]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe0b9836d0 a2=0 a3=7ffe0b9836bc items=0 ppid=2850 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.415000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 11:11:22.416000 audit[2964]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2964 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.416000 audit[2964]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff15131fe0 a2=0 a3=7fff15131fcc items=0 ppid=2850 pid=2964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.416000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 11:11:22.419000 audit[2966]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2966 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.419000 audit[2966]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff49c3d2a0 a2=0 a3=7fff49c3d28c items=0 ppid=2850 pid=2966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.419000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 11:11:22.423000 audit[2969]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2969 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.423000 audit[2969]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc86d359f0 a2=0 a3=7ffc86d359dc items=0 ppid=2850 pid=2969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.423000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 11:11:22.424000 audit[2970]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2970 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.424000 audit[2970]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc37b2ef40 a2=0 a3=7ffc37b2ef2c items=0 ppid=2850 pid=2970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.424000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 11:11:22.427000 audit[2972]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2972 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.427000 audit[2972]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff9c207e40 a2=0 a3=7fff9c207e2c items=0 ppid=2850 pid=2972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.427000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 11:11:22.428000 audit[2973]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2973 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.428000 audit[2973]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdbb1a9790 a2=0 a3=7ffdbb1a977c items=0 ppid=2850 pid=2973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 11:11:22.431000 audit[2975]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2975 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.431000 audit[2975]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffda5c1b00 a2=0 a3=7fffda5c1aec items=0 ppid=2850 pid=2975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.431000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 11:11:22.436000 audit[2978]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2978 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.436000 audit[2978]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce581c080 a2=0 a3=7ffce581c06c items=0 ppid=2850 pid=2978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 11:11:22.440000 audit[2981]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2981 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.440000 audit[2981]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcaa200640 a2=0 a3=7ffcaa20062c items=0 ppid=2850 pid=2981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 11:11:22.441000 audit[2982]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2982 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.441000 audit[2982]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcc8e59ac0 a2=0 a3=7ffcc8e59aac items=0 ppid=2850 pid=2982 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.441000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 11:11:22.444000 audit[2984]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2984 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.444000 audit[2984]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe5d828460 a2=0 a3=7ffe5d82844c items=0 ppid=2850 pid=2984 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.444000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 11:11:22.449000 audit[2987]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2987 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.449000 audit[2987]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe800a2a00 a2=0 a3=7ffe800a29ec items=0 ppid=2850 pid=2987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.449000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 11:11:22.451000 audit[2988]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2988 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.451000 audit[2988]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1b64b820 a2=0 a3=7ffe1b64b80c items=0 ppid=2850 pid=2988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.451000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 11:11:22.455000 audit[2990]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2990 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.455000 audit[2990]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc50cf3b00 a2=0 a3=7ffc50cf3aec items=0 ppid=2850 pid=2990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.455000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 11:11:22.457000 audit[2991]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2991 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.457000 audit[2991]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd37aaec60 a2=0 a3=7ffd37aaec4c items=0 ppid=2850 pid=2991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.457000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 11:11:22.461000 audit[2993]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2993 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.461000 audit[2993]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe8e3103c0 a2=0 a3=7ffe8e3103ac items=0 ppid=2850 pid=2993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.461000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 11:11:22.467000 audit[2996]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2996 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 11:11:22.467000 audit[2996]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff4a043ea0 a2=0 a3=7fff4a043e8c items=0 ppid=2850 pid=2996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.467000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 11:11:22.472000 audit[2998]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2998 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 11:11:22.472000 audit[2998]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe3e2ff4a0 a2=0 a3=7ffe3e2ff48c items=0 ppid=2850 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.472000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:22.473000 audit[2998]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2998 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 11:11:22.473000 audit[2998]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe3e2ff4a0 a2=0 a3=7ffe3e2ff48c items=0 ppid=2850 pid=2998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:22.473000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:23.079369 kubelet[2596]: I0702 11:11:23.079280 2596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-2vgft" podStartSLOduration=2.079270891 podStartE2EDuration="2.079270891s" podCreationTimestamp="2024-07-02 11:11:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 11:11:23.079111912 +0000 UTC m=+15.116790739" watchObservedRunningTime="2024-07-02 11:11:23.079270891 +0000 UTC m=+15.116949714" Jul 2 11:11:23.496256 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1942885138.mount: Deactivated successfully. Jul 2 11:11:23.916458 env[1554]: time="2024-07-02T11:11:23.916402767Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:23.916975 env[1554]: time="2024-07-02T11:11:23.916943680Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:23.917603 env[1554]: time="2024-07-02T11:11:23.917563457Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:23.918266 env[1554]: time="2024-07-02T11:11:23.918225746Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:479ddc7ff9ab095058b96f6710bbf070abada86332e267d6e5dcc1df36ba2cc5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:23.918600 env[1554]: time="2024-07-02T11:11:23.918558153Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\" returns image reference \"sha256:01249e32d0f6f7d0ad79761d634d16738f1a5792b893f202f9a417c63034411d\"" Jul 2 11:11:23.920193 env[1554]: time="2024-07-02T11:11:23.920179889Z" level=info msg="CreateContainer within sandbox \"0001b6b3babd9b69a41edfce0ff54eef70ffc76afa072d7e4a865d7966eaf7bb\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 2 11:11:23.924614 env[1554]: time="2024-07-02T11:11:23.924566393Z" level=info msg="CreateContainer within sandbox \"0001b6b3babd9b69a41edfce0ff54eef70ffc76afa072d7e4a865d7966eaf7bb\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"2df958766935249b6df053cf5766d87215c75333901543f5391282c5b2fa618a\"" Jul 2 11:11:23.925290 env[1554]: time="2024-07-02T11:11:23.925266223Z" level=info msg="StartContainer for \"2df958766935249b6df053cf5766d87215c75333901543f5391282c5b2fa618a\"" Jul 2 11:11:23.935679 systemd[1]: Started cri-containerd-2df958766935249b6df053cf5766d87215c75333901543f5391282c5b2fa618a.scope. Jul 2 11:11:23.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit: BPF prog-id=111 op=LOAD Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2794 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:23.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264663935383736363933353234396236646630353363663537363664 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2794 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:23.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264663935383736363933353234396236646630353363663537363664 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit: BPF prog-id=112 op=LOAD Jul 2 11:11:23.940000 audit[3006]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032cc70 items=0 ppid=2794 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:23.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264663935383736363933353234396236646630353363663537363664 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit: BPF prog-id=113 op=LOAD Jul 2 11:11:23.940000 audit[3006]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032ccb8 items=0 ppid=2794 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:23.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264663935383736363933353234396236646630353363663537363664 Jul 2 11:11:23.940000 audit: BPF prog-id=113 op=UNLOAD Jul 2 11:11:23.940000 audit: BPF prog-id=112 op=UNLOAD Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { perfmon } for pid=3006 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit[3006]: AVC avc: denied { bpf } for pid=3006 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:23.940000 audit: BPF prog-id=114 op=LOAD Jul 2 11:11:23.940000 audit[3006]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032d0c8 items=0 ppid=2794 pid=3006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:23.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264663935383736363933353234396236646630353363663537363664 Jul 2 11:11:23.947291 env[1554]: time="2024-07-02T11:11:23.947238169Z" level=info msg="StartContainer for \"2df958766935249b6df053cf5766d87215c75333901543f5391282c5b2fa618a\" returns successfully" Jul 2 11:11:23.979442 update_engine[1548]: I0702 11:11:23.979343 1548 update_attempter.cc:509] Updating boot flags... Jul 2 11:11:24.074312 kubelet[2596]: I0702 11:11:24.074282 2596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76ff79f7fd-gl5x6" podStartSLOduration=1.317515429 podStartE2EDuration="3.074272029s" podCreationTimestamp="2024-07-02 11:11:21 +0000 UTC" firstStartedPulling="2024-07-02 11:11:22.162462256 +0000 UTC m=+14.200141081" lastFinishedPulling="2024-07-02 11:11:23.919218854 +0000 UTC m=+15.956897681" observedRunningTime="2024-07-02 11:11:24.07408592 +0000 UTC m=+16.111764747" watchObservedRunningTime="2024-07-02 11:11:24.074272029 +0000 UTC m=+16.111950853" Jul 2 11:11:26.544000 audit[3066]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=3066 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:26.572018 kernel: kauditd_printk_skb: 359 callbacks suppressed Jul 2 11:11:26.572057 kernel: audit: type=1325 audit(1719918686.544:908): table=filter:89 family=2 entries=15 op=nft_register_rule pid=3066 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:26.544000 audit[3066]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd854ff200 a2=0 a3=7ffd854ff1ec items=0 ppid=2850 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:26.658245 kubelet[2596]: I0702 11:11:26.658221 2596 topology_manager.go:215] "Topology Admit Handler" podUID="d706a93e-44a0-4262-9aff-ffdc6395f6f4" podNamespace="calico-system" podName="calico-typha-7c78c8bdc5-ffbv7" Jul 2 11:11:26.661309 systemd[1]: Created slice kubepods-besteffort-podd706a93e_44a0_4262_9aff_ffdc6395f6f4.slice. Jul 2 11:11:26.677422 kubelet[2596]: I0702 11:11:26.677399 2596 topology_manager.go:215] "Topology Admit Handler" podUID="200bc9f7-5be2-4e20-8056-f507fb405444" podNamespace="calico-system" podName="calico-node-slmqj" Jul 2 11:11:26.680126 systemd[1]: Created slice kubepods-besteffort-pod200bc9f7_5be2_4e20_8056_f507fb405444.slice. Jul 2 11:11:26.727973 kernel: audit: type=1300 audit(1719918686.544:908): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd854ff200 a2=0 a3=7ffd854ff1ec items=0 ppid=2850 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:26.728037 kernel: audit: type=1327 audit(1719918686.544:908): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:26.544000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:26.782966 kubelet[2596]: I0702 11:11:26.782944 2596 topology_manager.go:215] "Topology Admit Handler" podUID="b09791f9-8fe4-4c17-ac3e-a51fe3faea00" podNamespace="calico-system" podName="csi-node-driver-dfvxs" Jul 2 11:11:26.783129 kubelet[2596]: E0702 11:11:26.783119 2596 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dfvxs" podUID="b09791f9-8fe4-4c17-ac3e-a51fe3faea00" Jul 2 11:11:26.544000 audit[3066]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=3066 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:26.821625 kubelet[2596]: I0702 11:11:26.821559 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/200bc9f7-5be2-4e20-8056-f507fb405444-lib-modules\") pod \"calico-node-slmqj\" (UID: \"200bc9f7-5be2-4e20-8056-f507fb405444\") " pod="calico-system/calico-node-slmqj" Jul 2 11:11:26.821625 kubelet[2596]: I0702 11:11:26.821587 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/200bc9f7-5be2-4e20-8056-f507fb405444-flexvol-driver-host\") pod \"calico-node-slmqj\" (UID: \"200bc9f7-5be2-4e20-8056-f507fb405444\") " pod="calico-system/calico-node-slmqj" Jul 2 11:11:26.821625 kubelet[2596]: I0702 11:11:26.821607 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d706a93e-44a0-4262-9aff-ffdc6395f6f4-typha-certs\") pod \"calico-typha-7c78c8bdc5-ffbv7\" (UID: \"d706a93e-44a0-4262-9aff-ffdc6395f6f4\") " pod="calico-system/calico-typha-7c78c8bdc5-ffbv7" Jul 2 11:11:26.821625 kubelet[2596]: I0702 11:11:26.821623 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p5lhw\" (UniqueName: \"kubernetes.io/projected/d706a93e-44a0-4262-9aff-ffdc6395f6f4-kube-api-access-p5lhw\") pod \"calico-typha-7c78c8bdc5-ffbv7\" (UID: \"d706a93e-44a0-4262-9aff-ffdc6395f6f4\") " pod="calico-system/calico-typha-7c78c8bdc5-ffbv7" Jul 2 11:11:26.821762 kubelet[2596]: I0702 11:11:26.821647 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/200bc9f7-5be2-4e20-8056-f507fb405444-xtables-lock\") pod \"calico-node-slmqj\" (UID: \"200bc9f7-5be2-4e20-8056-f507fb405444\") " pod="calico-system/calico-node-slmqj" Jul 2 11:11:26.821762 kubelet[2596]: I0702 11:11:26.821675 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/200bc9f7-5be2-4e20-8056-f507fb405444-var-lib-calico\") pod \"calico-node-slmqj\" (UID: \"200bc9f7-5be2-4e20-8056-f507fb405444\") " pod="calico-system/calico-node-slmqj" Jul 2 11:11:26.821762 kubelet[2596]: I0702 11:11:26.821733 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/200bc9f7-5be2-4e20-8056-f507fb405444-cni-net-dir\") pod \"calico-node-slmqj\" (UID: \"200bc9f7-5be2-4e20-8056-f507fb405444\") " pod="calico-system/calico-node-slmqj" Jul 2 11:11:26.821823 kubelet[2596]: I0702 11:11:26.821777 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/200bc9f7-5be2-4e20-8056-f507fb405444-node-certs\") pod \"calico-node-slmqj\" (UID: \"200bc9f7-5be2-4e20-8056-f507fb405444\") " pod="calico-system/calico-node-slmqj" Jul 2 11:11:26.821823 kubelet[2596]: I0702 11:11:26.821791 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/200bc9f7-5be2-4e20-8056-f507fb405444-var-run-calico\") pod \"calico-node-slmqj\" (UID: \"200bc9f7-5be2-4e20-8056-f507fb405444\") " pod="calico-system/calico-node-slmqj" Jul 2 11:11:26.821823 kubelet[2596]: I0702 11:11:26.821804 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/200bc9f7-5be2-4e20-8056-f507fb405444-cni-bin-dir\") pod \"calico-node-slmqj\" (UID: \"200bc9f7-5be2-4e20-8056-f507fb405444\") " pod="calico-system/calico-node-slmqj" Jul 2 11:11:26.821823 kubelet[2596]: I0702 11:11:26.821819 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vrw59\" (UniqueName: \"kubernetes.io/projected/200bc9f7-5be2-4e20-8056-f507fb405444-kube-api-access-vrw59\") pod \"calico-node-slmqj\" (UID: \"200bc9f7-5be2-4e20-8056-f507fb405444\") " pod="calico-system/calico-node-slmqj" Jul 2 11:11:26.821905 kubelet[2596]: I0702 11:11:26.821832 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d706a93e-44a0-4262-9aff-ffdc6395f6f4-tigera-ca-bundle\") pod \"calico-typha-7c78c8bdc5-ffbv7\" (UID: \"d706a93e-44a0-4262-9aff-ffdc6395f6f4\") " pod="calico-system/calico-typha-7c78c8bdc5-ffbv7" Jul 2 11:11:26.821905 kubelet[2596]: I0702 11:11:26.821840 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/200bc9f7-5be2-4e20-8056-f507fb405444-policysync\") pod \"calico-node-slmqj\" (UID: \"200bc9f7-5be2-4e20-8056-f507fb405444\") " pod="calico-system/calico-node-slmqj" Jul 2 11:11:26.821905 kubelet[2596]: I0702 11:11:26.821848 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/200bc9f7-5be2-4e20-8056-f507fb405444-cni-log-dir\") pod \"calico-node-slmqj\" (UID: \"200bc9f7-5be2-4e20-8056-f507fb405444\") " pod="calico-system/calico-node-slmqj" Jul 2 11:11:26.821905 kubelet[2596]: I0702 11:11:26.821858 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/200bc9f7-5be2-4e20-8056-f507fb405444-tigera-ca-bundle\") pod \"calico-node-slmqj\" (UID: \"200bc9f7-5be2-4e20-8056-f507fb405444\") " pod="calico-system/calico-node-slmqj" Jul 2 11:11:26.544000 audit[3066]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd854ff200 a2=0 a3=0 items=0 ppid=2850 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:26.922053 kubelet[2596]: I0702 11:11:26.922039 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b09791f9-8fe4-4c17-ac3e-a51fe3faea00-kubelet-dir\") pod \"csi-node-driver-dfvxs\" (UID: \"b09791f9-8fe4-4c17-ac3e-a51fe3faea00\") " pod="calico-system/csi-node-driver-dfvxs" Jul 2 11:11:26.922103 kubelet[2596]: I0702 11:11:26.922059 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b09791f9-8fe4-4c17-ac3e-a51fe3faea00-socket-dir\") pod \"csi-node-driver-dfvxs\" (UID: \"b09791f9-8fe4-4c17-ac3e-a51fe3faea00\") " pod="calico-system/csi-node-driver-dfvxs" Jul 2 11:11:26.922134 kubelet[2596]: I0702 11:11:26.922102 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b09791f9-8fe4-4c17-ac3e-a51fe3faea00-registration-dir\") pod \"csi-node-driver-dfvxs\" (UID: \"b09791f9-8fe4-4c17-ac3e-a51fe3faea00\") " pod="calico-system/csi-node-driver-dfvxs" Jul 2 11:11:26.922134 kubelet[2596]: I0702 11:11:26.922120 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c69z9\" (UniqueName: \"kubernetes.io/projected/b09791f9-8fe4-4c17-ac3e-a51fe3faea00-kube-api-access-c69z9\") pod \"csi-node-driver-dfvxs\" (UID: \"b09791f9-8fe4-4c17-ac3e-a51fe3faea00\") " pod="calico-system/csi-node-driver-dfvxs" Jul 2 11:11:26.922219 kubelet[2596]: I0702 11:11:26.922208 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b09791f9-8fe4-4c17-ac3e-a51fe3faea00-varrun\") pod \"csi-node-driver-dfvxs\" (UID: \"b09791f9-8fe4-4c17-ac3e-a51fe3faea00\") " pod="calico-system/csi-node-driver-dfvxs" Jul 2 11:11:26.922515 kubelet[2596]: E0702 11:11:26.922471 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.922515 kubelet[2596]: W0702 11:11:26.922481 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.922515 kubelet[2596]: E0702 11:11:26.922512 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.922640 kubelet[2596]: E0702 11:11:26.922597 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.922640 kubelet[2596]: W0702 11:11:26.922603 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.922640 kubelet[2596]: E0702 11:11:26.922609 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.922772 kubelet[2596]: E0702 11:11:26.922736 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.922772 kubelet[2596]: W0702 11:11:26.922743 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.922772 kubelet[2596]: E0702 11:11:26.922751 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.922893 kubelet[2596]: E0702 11:11:26.922882 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.922893 kubelet[2596]: W0702 11:11:26.922890 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.922946 kubelet[2596]: E0702 11:11:26.922898 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.922994 kubelet[2596]: E0702 11:11:26.922988 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.922994 kubelet[2596]: W0702 11:11:26.922993 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.923032 kubelet[2596]: E0702 11:11:26.922999 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.923071 kubelet[2596]: E0702 11:11:26.923066 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.923071 kubelet[2596]: W0702 11:11:26.923070 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.923114 kubelet[2596]: E0702 11:11:26.923076 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.923142 kubelet[2596]: E0702 11:11:26.923137 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.923142 kubelet[2596]: W0702 11:11:26.923142 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.923177 kubelet[2596]: E0702 11:11:26.923147 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.923211 kubelet[2596]: E0702 11:11:26.923206 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.923233 kubelet[2596]: W0702 11:11:26.923211 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.923233 kubelet[2596]: E0702 11:11:26.923216 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.923297 kubelet[2596]: E0702 11:11:26.923293 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.923297 kubelet[2596]: W0702 11:11:26.923297 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.923333 kubelet[2596]: E0702 11:11:26.923302 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.923502 kubelet[2596]: E0702 11:11:26.923491 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.923502 kubelet[2596]: W0702 11:11:26.923501 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.923562 kubelet[2596]: E0702 11:11:26.923511 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.923609 kubelet[2596]: E0702 11:11:26.923603 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.923629 kubelet[2596]: W0702 11:11:26.923609 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.923629 kubelet[2596]: E0702 11:11:26.923618 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.923719 kubelet[2596]: E0702 11:11:26.923713 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.923741 kubelet[2596]: W0702 11:11:26.923720 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.923741 kubelet[2596]: E0702 11:11:26.923728 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.923851 kubelet[2596]: E0702 11:11:26.923844 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.923851 kubelet[2596]: W0702 11:11:26.923849 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.923914 kubelet[2596]: E0702 11:11:26.923855 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.923975 kubelet[2596]: E0702 11:11:26.923968 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.924008 kubelet[2596]: W0702 11:11:26.923976 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.924008 kubelet[2596]: E0702 11:11:26.923986 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.924074 kubelet[2596]: E0702 11:11:26.924069 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.924074 kubelet[2596]: W0702 11:11:26.924074 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.924117 kubelet[2596]: E0702 11:11:26.924080 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.924147 kubelet[2596]: E0702 11:11:26.924141 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.924147 kubelet[2596]: W0702 11:11:26.924146 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.924212 kubelet[2596]: E0702 11:11:26.924151 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.924260 kubelet[2596]: E0702 11:11:26.924252 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.924285 kubelet[2596]: W0702 11:11:26.924262 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.924304 kubelet[2596]: E0702 11:11:26.924283 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.924420 kubelet[2596]: E0702 11:11:26.924414 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.924447 kubelet[2596]: W0702 11:11:26.924421 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.924447 kubelet[2596]: E0702 11:11:26.924431 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.924583 kubelet[2596]: E0702 11:11:26.924577 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.924606 kubelet[2596]: W0702 11:11:26.924584 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.924606 kubelet[2596]: E0702 11:11:26.924594 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.924688 kubelet[2596]: E0702 11:11:26.924682 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.924715 kubelet[2596]: W0702 11:11:26.924688 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.924715 kubelet[2596]: E0702 11:11:26.924695 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.928576 kubelet[2596]: E0702 11:11:26.928565 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.928576 kubelet[2596]: W0702 11:11:26.928573 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.928659 kubelet[2596]: E0702 11:11:26.928585 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.928700 kubelet[2596]: E0702 11:11:26.928693 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:26.928736 kubelet[2596]: W0702 11:11:26.928701 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:26.928736 kubelet[2596]: E0702 11:11:26.928709 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:26.942028 kernel: audit: type=1325 audit(1719918686.544:909): table=nat:90 family=2 entries=12 op=nft_register_rule pid=3066 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:26.942062 kernel: audit: type=1300 audit(1719918686.544:909): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd854ff200 a2=0 a3=0 items=0 ppid=2850 pid=3066 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:26.942081 kernel: audit: type=1327 audit(1719918686.544:909): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:26.544000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:26.963930 env[1554]: time="2024-07-02T11:11:26.963906128Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7c78c8bdc5-ffbv7,Uid:d706a93e-44a0-4262-9aff-ffdc6395f6f4,Namespace:calico-system,Attempt:0,}" Jul 2 11:11:26.971259 env[1554]: time="2024-07-02T11:11:26.971225809Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:11:26.971328 env[1554]: time="2024-07-02T11:11:26.971254737Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:11:26.971328 env[1554]: time="2024-07-02T11:11:26.971276365Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:11:26.971384 env[1554]: time="2024-07-02T11:11:26.971367026Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4f436280de9cd7762bbbe88f7c00d601e7c1a75cb7bf0929139a990434d1a373 pid=3102 runtime=io.containerd.runc.v2 Jul 2 11:11:26.976664 systemd[1]: Started cri-containerd-4f436280de9cd7762bbbe88f7c00d601e7c1a75cb7bf0929139a990434d1a373.scope. Jul 2 11:11:26.981644 env[1554]: time="2024-07-02T11:11:26.981625997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-slmqj,Uid:200bc9f7-5be2-4e20-8056-f507fb405444,Namespace:calico-system,Attempt:0,}" Jul 2 11:11:26.987762 env[1554]: time="2024-07-02T11:11:26.987726841Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:11:26.987762 env[1554]: time="2024-07-02T11:11:26.987749738Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:11:26.987762 env[1554]: time="2024-07-02T11:11:26.987756877Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:11:26.987875 env[1554]: time="2024-07-02T11:11:26.987857707Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/73ee5c5c5832a0b846ee9c133261191a0803f89b5e641bd5cb5c6dfd99568785 pid=3126 runtime=io.containerd.runc.v2 Jul 2 11:11:26.993089 systemd[1]: Started cri-containerd-73ee5c5c5832a0b846ee9c133261191a0803f89b5e641bd5cb5c6dfd99568785.scope. Jul 2 11:11:26.787000 audit[3068]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=3068 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:26.787000 audit[3068]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcd0ff7c80 a2=0 a3=7ffcd0ff7c6c items=0 ppid=2850 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:27.062053 kubelet[2596]: E0702 11:11:27.062023 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.062053 kubelet[2596]: W0702 11:11:27.062034 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.062053 kubelet[2596]: E0702 11:11:27.062045 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.062171 kubelet[2596]: E0702 11:11:27.062166 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.062171 kubelet[2596]: W0702 11:11:27.062171 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.062209 kubelet[2596]: E0702 11:11:27.062178 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.062260 kubelet[2596]: E0702 11:11:27.062255 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.062289 kubelet[2596]: W0702 11:11:27.062260 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.062289 kubelet[2596]: E0702 11:11:27.062269 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.062409 kubelet[2596]: E0702 11:11:27.062370 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.062409 kubelet[2596]: W0702 11:11:27.062377 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.062409 kubelet[2596]: E0702 11:11:27.062386 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.062478 kubelet[2596]: E0702 11:11:27.062474 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.062496 kubelet[2596]: W0702 11:11:27.062479 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.062496 kubelet[2596]: E0702 11:11:27.062486 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.062607 kubelet[2596]: E0702 11:11:27.062559 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.062607 kubelet[2596]: W0702 11:11:27.062564 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.062607 kubelet[2596]: E0702 11:11:27.062571 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.062734 kubelet[2596]: E0702 11:11:27.062728 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.062734 kubelet[2596]: W0702 11:11:27.062733 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.062800 kubelet[2596]: E0702 11:11:27.062740 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.062833 kubelet[2596]: E0702 11:11:27.062829 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.062864 kubelet[2596]: W0702 11:11:27.062834 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.062864 kubelet[2596]: E0702 11:11:27.062841 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.062919 kubelet[2596]: E0702 11:11:27.062914 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.062919 kubelet[2596]: W0702 11:11:27.062918 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.062964 kubelet[2596]: E0702 11:11:27.062925 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.063003 kubelet[2596]: E0702 11:11:27.062998 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.063003 kubelet[2596]: W0702 11:11:27.063002 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.063043 kubelet[2596]: E0702 11:11:27.063009 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.063100 kubelet[2596]: E0702 11:11:27.063095 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.063122 kubelet[2596]: W0702 11:11:27.063100 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.063122 kubelet[2596]: E0702 11:11:27.063107 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.063181 kubelet[2596]: E0702 11:11:27.063176 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.063203 kubelet[2596]: W0702 11:11:27.063182 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.063203 kubelet[2596]: E0702 11:11:27.063189 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.063274 kubelet[2596]: E0702 11:11:27.063269 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.063299 kubelet[2596]: W0702 11:11:27.063274 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.063299 kubelet[2596]: E0702 11:11:27.063279 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.063358 kubelet[2596]: E0702 11:11:27.063352 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.063379 kubelet[2596]: W0702 11:11:27.063358 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.063379 kubelet[2596]: E0702 11:11:27.063366 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.063433 kubelet[2596]: E0702 11:11:27.063428 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.063433 kubelet[2596]: W0702 11:11:27.063433 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.063484 kubelet[2596]: E0702 11:11:27.063449 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.063506 kubelet[2596]: E0702 11:11:27.063492 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.063506 kubelet[2596]: W0702 11:11:27.063496 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.063549 kubelet[2596]: E0702 11:11:27.063507 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.063572 kubelet[2596]: E0702 11:11:27.063554 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.063572 kubelet[2596]: W0702 11:11:27.063558 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.063572 kubelet[2596]: E0702 11:11:27.063563 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.063671 kubelet[2596]: E0702 11:11:27.063664 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.063706 kubelet[2596]: W0702 11:11:27.063671 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.063706 kubelet[2596]: E0702 11:11:27.063681 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.063790 kubelet[2596]: E0702 11:11:27.063784 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.063790 kubelet[2596]: W0702 11:11:27.063790 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.063852 kubelet[2596]: E0702 11:11:27.063799 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.063896 kubelet[2596]: E0702 11:11:27.063890 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.063933 kubelet[2596]: W0702 11:11:27.063895 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.063933 kubelet[2596]: E0702 11:11:27.063906 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.063997 kubelet[2596]: E0702 11:11:27.063991 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.064034 kubelet[2596]: W0702 11:11:27.063997 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.064034 kubelet[2596]: E0702 11:11:27.064006 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.064132 kubelet[2596]: E0702 11:11:27.064127 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.064132 kubelet[2596]: W0702 11:11:27.064132 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.064180 kubelet[2596]: E0702 11:11:27.064138 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.064207 kubelet[2596]: E0702 11:11:27.064202 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.064207 kubelet[2596]: W0702 11:11:27.064206 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.064253 kubelet[2596]: E0702 11:11:27.064211 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.064300 kubelet[2596]: E0702 11:11:27.064295 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.064300 kubelet[2596]: W0702 11:11:27.064300 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.064338 kubelet[2596]: E0702 11:11:27.064306 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.064387 kubelet[2596]: E0702 11:11:27.064382 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.064409 kubelet[2596]: W0702 11:11:27.064387 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.064409 kubelet[2596]: E0702 11:11:27.064392 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.069960 kubelet[2596]: E0702 11:11:27.069950 2596 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 11:11:27.069960 kubelet[2596]: W0702 11:11:27.069958 2596 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 11:11:27.070021 kubelet[2596]: E0702 11:11:27.069967 2596 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 11:11:27.159693 kernel: audit: type=1325 audit(1719918686.787:910): table=filter:91 family=2 entries=16 op=nft_register_rule pid=3068 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:27.159729 kernel: audit: type=1300 audit(1719918686.787:910): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcd0ff7c80 a2=0 a3=7ffcd0ff7c6c items=0 ppid=2850 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:27.159744 kernel: audit: type=1327 audit(1719918686.787:910): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:26.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:27.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281803 kernel: audit: type=1400 audit(1719918687.007:911): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.217000 audit: BPF prog-id=115 op=LOAD Jul 2 11:11:27.218000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3126 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:27.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733656535633563353833326130623834366565396331333332363131 Jul 2 11:11:27.218000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3126 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:27.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733656535633563353833326130623834366565396331333332363131 Jul 2 11:11:27.218000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit: BPF prog-id=116 op=LOAD Jul 2 11:11:27.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.218000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003089c0 items=0 ppid=3126 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:27.281000 audit: BPF prog-id=117 op=LOAD Jul 2 11:11:27.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733656535633563353833326130623834366565396331333332363131 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit: BPF prog-id=118 op=LOAD Jul 2 11:11:27.281000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000308a08 items=0 ppid=3126 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:27.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733656535633563353833326130623834366565396331333332363131 Jul 2 11:11:27.281000 audit: BPF prog-id=118 op=UNLOAD Jul 2 11:11:27.281000 audit: BPF prog-id=116 op=UNLOAD Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { perfmon } for pid=3136 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3136]: AVC avc: denied { bpf } for pid=3136 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit: BPF prog-id=119 op=LOAD Jul 2 11:11:27.281000 audit[3136]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000308e18 items=0 ppid=3126 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:27.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733656535633563353833326130623834366565396331333332363131 Jul 2 11:11:27.281000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3102 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:27.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466343336323830646539636437373632626262653838663763303064 Jul 2 11:11:27.281000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3102 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:27.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466343336323830646539636437373632626262653838663763303064 Jul 2 11:11:27.281000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.281000 audit: BPF prog-id=120 op=LOAD Jul 2 11:11:27.281000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002c0560 items=0 ppid=3102 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:27.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466343336323830646539636437373632626262653838663763303064 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit: BPF prog-id=121 op=LOAD Jul 2 11:11:27.282000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002c05a8 items=0 ppid=3102 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:27.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466343336323830646539636437373632626262653838663763303064 Jul 2 11:11:27.282000 audit: BPF prog-id=121 op=UNLOAD Jul 2 11:11:27.282000 audit: BPF prog-id=120 op=UNLOAD Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { perfmon } for pid=3111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit[3111]: AVC avc: denied { bpf } for pid=3111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:27.282000 audit: BPF prog-id=122 op=LOAD Jul 2 11:11:27.282000 audit[3111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002c09b8 items=0 ppid=3102 pid=3111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:27.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466343336323830646539636437373632626262653838663763303064 Jul 2 11:11:27.002000 audit[3068]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=3068 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:27.002000 audit[3068]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcd0ff7c80 a2=0 a3=0 items=0 ppid=2850 pid=3068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:27.002000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:27.286697 env[1554]: time="2024-07-02T11:11:27.286671141Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-slmqj,Uid:200bc9f7-5be2-4e20-8056-f507fb405444,Namespace:calico-system,Attempt:0,} returns sandbox id \"73ee5c5c5832a0b846ee9c133261191a0803f89b5e641bd5cb5c6dfd99568785\"" Jul 2 11:11:27.287440 env[1554]: time="2024-07-02T11:11:27.287428388Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 11:11:27.300568 env[1554]: time="2024-07-02T11:11:27.300541869Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7c78c8bdc5-ffbv7,Uid:d706a93e-44a0-4262-9aff-ffdc6395f6f4,Namespace:calico-system,Attempt:0,} returns sandbox id \"4f436280de9cd7762bbbe88f7c00d601e7c1a75cb7bf0929139a990434d1a373\"" Jul 2 11:11:28.766043 env[1554]: time="2024-07-02T11:11:28.765990966Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:28.766583 env[1554]: time="2024-07-02T11:11:28.766541719Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:28.767142 env[1554]: time="2024-07-02T11:11:28.767101549Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:28.767746 env[1554]: time="2024-07-02T11:11:28.767704763Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:28.768032 env[1554]: time="2024-07-02T11:11:28.767989305Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:587b28ecfc62e2a60919e6a39f9b25be37c77da99d8c84252716fa3a49a171b9\"" Jul 2 11:11:28.768548 env[1554]: time="2024-07-02T11:11:28.768500463Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\"" Jul 2 11:11:28.769043 env[1554]: time="2024-07-02T11:11:28.769027989Z" level=info msg="CreateContainer within sandbox \"73ee5c5c5832a0b846ee9c133261191a0803f89b5e641bd5cb5c6dfd99568785\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 11:11:28.774101 env[1554]: time="2024-07-02T11:11:28.774060885Z" level=info msg="CreateContainer within sandbox \"73ee5c5c5832a0b846ee9c133261191a0803f89b5e641bd5cb5c6dfd99568785\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9f27abee3d87d3e9d5542ba526289713d70083508c4ce4d7971c712649d3f424\"" Jul 2 11:11:28.774334 env[1554]: time="2024-07-02T11:11:28.774319016Z" level=info msg="StartContainer for \"9f27abee3d87d3e9d5542ba526289713d70083508c4ce4d7971c712649d3f424\"" Jul 2 11:11:28.783323 systemd[1]: Started cri-containerd-9f27abee3d87d3e9d5542ba526289713d70083508c4ce4d7971c712649d3f424.scope. Jul 2 11:11:28.788000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.788000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f3b8e63b2f8 items=0 ppid=3126 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:28.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966323761626565336438376433653964353534326261353236323839 Jul 2 11:11:28.788000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.788000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.788000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.788000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.788000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.788000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.788000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.788000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.788000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.788000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.788000 audit: BPF prog-id=123 op=LOAD Jul 2 11:11:28.788000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000248f8 items=0 ppid=3126 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:28.788000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966323761626565336438376433653964353534326261353236323839 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit: BPF prog-id=124 op=LOAD Jul 2 11:11:28.789000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024948 items=0 ppid=3126 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:28.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966323761626565336438376433653964353534326261353236323839 Jul 2 11:11:28.789000 audit: BPF prog-id=124 op=UNLOAD Jul 2 11:11:28.789000 audit: BPF prog-id=123 op=UNLOAD Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:28.789000 audit: BPF prog-id=125 op=LOAD Jul 2 11:11:28.789000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000249d8 items=0 ppid=3126 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:28.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966323761626565336438376433653964353534326261353236323839 Jul 2 11:11:28.795780 env[1554]: time="2024-07-02T11:11:28.795757253Z" level=info msg="StartContainer for \"9f27abee3d87d3e9d5542ba526289713d70083508c4ce4d7971c712649d3f424\" returns successfully" Jul 2 11:11:28.801218 systemd[1]: cri-containerd-9f27abee3d87d3e9d5542ba526289713d70083508c4ce4d7971c712649d3f424.scope: Deactivated successfully. Jul 2 11:11:28.809000 audit: BPF prog-id=125 op=UNLOAD Jul 2 11:11:28.929036 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9f27abee3d87d3e9d5542ba526289713d70083508c4ce4d7971c712649d3f424-rootfs.mount: Deactivated successfully. Jul 2 11:11:29.025515 env[1554]: time="2024-07-02T11:11:29.025249687Z" level=info msg="shim disconnected" id=9f27abee3d87d3e9d5542ba526289713d70083508c4ce4d7971c712649d3f424 Jul 2 11:11:29.025515 env[1554]: time="2024-07-02T11:11:29.025381017Z" level=warning msg="cleaning up after shim disconnected" id=9f27abee3d87d3e9d5542ba526289713d70083508c4ce4d7971c712649d3f424 namespace=k8s.io Jul 2 11:11:29.025515 env[1554]: time="2024-07-02T11:11:29.025421389Z" level=info msg="cleaning up dead shim" Jul 2 11:11:29.026218 kubelet[2596]: E0702 11:11:29.025868 2596 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dfvxs" podUID="b09791f9-8fe4-4c17-ac3e-a51fe3faea00" Jul 2 11:11:29.043452 env[1554]: time="2024-07-02T11:11:29.043317940Z" level=warning msg="cleanup warnings time=\"2024-07-02T11:11:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3246 runtime=io.containerd.runc.v2\n" Jul 2 11:11:30.944960 env[1554]: time="2024-07-02T11:11:30.944933300Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:30.945606 env[1554]: time="2024-07-02T11:11:30.945591180Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:30.946183 env[1554]: time="2024-07-02T11:11:30.946162158Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:30.946959 env[1554]: time="2024-07-02T11:11:30.946946496Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:eff1501af12b7e27e2ef8f4e55d03d837bcb017aa5663e22e519059c452d51ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:30.947159 env[1554]: time="2024-07-02T11:11:30.947145608Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\" returns image reference \"sha256:a9372c0f51b54c589e5a16013ed3049b2a052dd6903d72603849fab2c4216fbc\"" Jul 2 11:11:30.947798 env[1554]: time="2024-07-02T11:11:30.947765100Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 11:11:30.951856 env[1554]: time="2024-07-02T11:11:30.951779875Z" level=info msg="CreateContainer within sandbox \"4f436280de9cd7762bbbe88f7c00d601e7c1a75cb7bf0929139a990434d1a373\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 11:11:30.956143 env[1554]: time="2024-07-02T11:11:30.956102424Z" level=info msg="CreateContainer within sandbox \"4f436280de9cd7762bbbe88f7c00d601e7c1a75cb7bf0929139a990434d1a373\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"694c1cdbdea318e6229e07104e0d19a2c5d444f9ebaf0810212e82a56e50ec6d\"" Jul 2 11:11:30.956392 env[1554]: time="2024-07-02T11:11:30.956372215Z" level=info msg="StartContainer for \"694c1cdbdea318e6229e07104e0d19a2c5d444f9ebaf0810212e82a56e50ec6d\"" Jul 2 11:11:30.966439 systemd[1]: Started cri-containerd-694c1cdbdea318e6229e07104e0d19a2c5d444f9ebaf0810212e82a56e50ec6d.scope. Jul 2 11:11:30.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.970000 audit: BPF prog-id=126 op=LOAD Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3102 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:30.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346331636462646561333138653632323965303731303465306431 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3102 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:30.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346331636462646561333138653632323965303731303465306431 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit: BPF prog-id=127 op=LOAD Jul 2 11:11:30.971000 audit[3273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00008eaa0 items=0 ppid=3102 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:30.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346331636462646561333138653632323965303731303465306431 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit: BPF prog-id=128 op=LOAD Jul 2 11:11:30.971000 audit[3273]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00008eae8 items=0 ppid=3102 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:30.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346331636462646561333138653632323965303731303465306431 Jul 2 11:11:30.971000 audit: BPF prog-id=128 op=UNLOAD Jul 2 11:11:30.971000 audit: BPF prog-id=127 op=UNLOAD Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { perfmon } for pid=3273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit[3273]: AVC avc: denied { bpf } for pid=3273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:30.971000 audit: BPF prog-id=129 op=LOAD Jul 2 11:11:30.971000 audit[3273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00008eef8 items=0 ppid=3102 pid=3273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:30.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639346331636462646561333138653632323965303731303465306431 Jul 2 11:11:30.988984 env[1554]: time="2024-07-02T11:11:30.988957699Z" level=info msg="StartContainer for \"694c1cdbdea318e6229e07104e0d19a2c5d444f9ebaf0810212e82a56e50ec6d\" returns successfully" Jul 2 11:11:31.025136 kubelet[2596]: E0702 11:11:31.025085 2596 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dfvxs" podUID="b09791f9-8fe4-4c17-ac3e-a51fe3faea00" Jul 2 11:11:31.112748 kubelet[2596]: I0702 11:11:31.112679 2596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7c78c8bdc5-ffbv7" podStartSLOduration=1.466164172 podStartE2EDuration="5.112655952s" podCreationTimestamp="2024-07-02 11:11:26 +0000 UTC" firstStartedPulling="2024-07-02 11:11:27.301133979 +0000 UTC m=+19.338812806" lastFinishedPulling="2024-07-02 11:11:30.947625759 +0000 UTC m=+22.985304586" observedRunningTime="2024-07-02 11:11:31.112006416 +0000 UTC m=+23.149685273" watchObservedRunningTime="2024-07-02 11:11:31.112655952 +0000 UTC m=+23.150334796" Jul 2 11:11:32.097689 kubelet[2596]: I0702 11:11:32.097574 2596 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 11:11:33.025550 kubelet[2596]: E0702 11:11:33.025479 2596 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dfvxs" podUID="b09791f9-8fe4-4c17-ac3e-a51fe3faea00" Jul 2 11:11:35.025537 kubelet[2596]: E0702 11:11:35.025486 2596 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-dfvxs" podUID="b09791f9-8fe4-4c17-ac3e-a51fe3faea00" Jul 2 11:11:35.423156 env[1554]: time="2024-07-02T11:11:35.423134913Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:35.423617 env[1554]: time="2024-07-02T11:11:35.423603435Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:35.424326 env[1554]: time="2024-07-02T11:11:35.424297042Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:35.424919 env[1554]: time="2024-07-02T11:11:35.424904294Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:35.425214 env[1554]: time="2024-07-02T11:11:35.425202960Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:107014d9f4c891a0235fa80b55df22451e8804ede5b891b632c5779ca3ab07a7\"" Jul 2 11:11:35.426409 env[1554]: time="2024-07-02T11:11:35.426368723Z" level=info msg="CreateContainer within sandbox \"73ee5c5c5832a0b846ee9c133261191a0803f89b5e641bd5cb5c6dfd99568785\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 11:11:35.431720 env[1554]: time="2024-07-02T11:11:35.431671869Z" level=info msg="CreateContainer within sandbox \"73ee5c5c5832a0b846ee9c133261191a0803f89b5e641bd5cb5c6dfd99568785\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"4d07edf97c50391327e552926ca0d982f2238e42e10051a26cff1a677d81e709\"" Jul 2 11:11:35.431950 env[1554]: time="2024-07-02T11:11:35.431918503Z" level=info msg="StartContainer for \"4d07edf97c50391327e552926ca0d982f2238e42e10051a26cff1a677d81e709\"" Jul 2 11:11:35.442109 systemd[1]: Started cri-containerd-4d07edf97c50391327e552926ca0d982f2238e42e10051a26cff1a677d81e709.scope. Jul 2 11:11:35.448000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.476634 kernel: kauditd_printk_skb: 217 callbacks suppressed Jul 2 11:11:35.476712 kernel: audit: type=1400 audit(1719918695.448:973): avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.448000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f83782baba8 items=0 ppid=3126 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:35.542325 kernel: audit: type=1300 audit(1719918695.448:973): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f83782baba8 items=0 ppid=3126 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:35.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464303765646639376335303339313332376535353239323663613064 Jul 2 11:11:35.732291 kernel: audit: type=1327 audit(1719918695.448:973): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464303765646639376335303339313332376535353239323663613064 Jul 2 11:11:35.732327 kernel: audit: type=1400 audit(1719918695.448:974): avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.448000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.795823 kernel: audit: type=1400 audit(1719918695.448:974): avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.448000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.859294 kernel: audit: type=1400 audit(1719918695.448:974): avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.448000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.448000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.928006 env[1554]: time="2024-07-02T11:11:35.927982637Z" level=info msg="StartContainer for \"4d07edf97c50391327e552926ca0d982f2238e42e10051a26cff1a677d81e709\" returns successfully" Jul 2 11:11:35.986690 kernel: audit: type=1400 audit(1719918695.448:974): avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.986767 kernel: audit: type=1400 audit(1719918695.448:974): avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.448000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:36.050603 kernel: audit: type=1400 audit(1719918695.448:974): avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.448000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:36.114571 kernel: audit: type=1400 audit(1719918695.448:974): avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.448000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.448000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.448000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.448000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.448000 audit: BPF prog-id=130 op=LOAD Jul 2 11:11:35.448000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c000309068 items=0 ppid=3126 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:35.448000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464303765646639376335303339313332376535353239323663613064 Jul 2 11:11:35.540000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.540000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.540000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.540000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.540000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.540000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.540000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.540000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.540000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.540000 audit: BPF prog-id=131 op=LOAD Jul 2 11:11:35.540000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0003090b8 items=0 ppid=3126 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:35.540000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464303765646639376335303339313332376535353239323663613064 Jul 2 11:11:35.730000 audit: BPF prog-id=131 op=UNLOAD Jul 2 11:11:35.731000 audit: BPF prog-id=130 op=UNLOAD Jul 2 11:11:35.731000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.731000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.731000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.731000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.731000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.731000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.731000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.731000 audit[3322]: AVC avc: denied { perfmon } for pid=3322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.731000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.731000 audit[3322]: AVC avc: denied { bpf } for pid=3322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:35.731000 audit: BPF prog-id=132 op=LOAD Jul 2 11:11:35.731000 audit[3322]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c000309148 items=0 ppid=3126 pid=3322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:35.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464303765646639376335303339313332376535353239323663613064 Jul 2 11:11:36.378887 systemd[1]: cri-containerd-4d07edf97c50391327e552926ca0d982f2238e42e10051a26cff1a677d81e709.scope: Deactivated successfully. Jul 2 11:11:36.390000 audit: BPF prog-id=132 op=UNLOAD Jul 2 11:11:36.392019 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4d07edf97c50391327e552926ca0d982f2238e42e10051a26cff1a677d81e709-rootfs.mount: Deactivated successfully. Jul 2 11:11:36.421601 kubelet[2596]: I0702 11:11:36.421578 2596 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 11:11:36.435667 kubelet[2596]: I0702 11:11:36.435615 2596 topology_manager.go:215] "Topology Admit Handler" podUID="f19dcd14-bc5e-4b10-bf51-921794a62686" podNamespace="kube-system" podName="coredns-7db6d8ff4d-nwl4c" Jul 2 11:11:36.435989 kubelet[2596]: I0702 11:11:36.435956 2596 topology_manager.go:215] "Topology Admit Handler" podUID="7f11a122-d563-4cfc-ba9d-d1495c79de02" podNamespace="kube-system" podName="coredns-7db6d8ff4d-glz8r" Jul 2 11:11:36.436627 kubelet[2596]: I0702 11:11:36.436603 2596 topology_manager.go:215] "Topology Admit Handler" podUID="3f2cbe57-39ba-405a-995f-373cd9bf3043" podNamespace="calico-system" podName="calico-kube-controllers-8c87778f6-5nk9g" Jul 2 11:11:36.441562 systemd[1]: Created slice kubepods-burstable-podf19dcd14_bc5e_4b10_bf51_921794a62686.slice. Jul 2 11:11:36.446833 systemd[1]: Created slice kubepods-burstable-pod7f11a122_d563_4cfc_ba9d_d1495c79de02.slice. Jul 2 11:11:36.450695 systemd[1]: Created slice kubepods-besteffort-pod3f2cbe57_39ba_405a_995f_373cd9bf3043.slice. Jul 2 11:11:36.625450 kubelet[2596]: I0702 11:11:36.625331 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f19dcd14-bc5e-4b10-bf51-921794a62686-config-volume\") pod \"coredns-7db6d8ff4d-nwl4c\" (UID: \"f19dcd14-bc5e-4b10-bf51-921794a62686\") " pod="kube-system/coredns-7db6d8ff4d-nwl4c" Jul 2 11:11:36.625450 kubelet[2596]: I0702 11:11:36.625431 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-s9s2b\" (UniqueName: \"kubernetes.io/projected/3f2cbe57-39ba-405a-995f-373cd9bf3043-kube-api-access-s9s2b\") pod \"calico-kube-controllers-8c87778f6-5nk9g\" (UID: \"3f2cbe57-39ba-405a-995f-373cd9bf3043\") " pod="calico-system/calico-kube-controllers-8c87778f6-5nk9g" Jul 2 11:11:36.626060 kubelet[2596]: I0702 11:11:36.625501 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kcw7h\" (UniqueName: \"kubernetes.io/projected/f19dcd14-bc5e-4b10-bf51-921794a62686-kube-api-access-kcw7h\") pod \"coredns-7db6d8ff4d-nwl4c\" (UID: \"f19dcd14-bc5e-4b10-bf51-921794a62686\") " pod="kube-system/coredns-7db6d8ff4d-nwl4c" Jul 2 11:11:36.626060 kubelet[2596]: I0702 11:11:36.625551 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rgbzq\" (UniqueName: \"kubernetes.io/projected/7f11a122-d563-4cfc-ba9d-d1495c79de02-kube-api-access-rgbzq\") pod \"coredns-7db6d8ff4d-glz8r\" (UID: \"7f11a122-d563-4cfc-ba9d-d1495c79de02\") " pod="kube-system/coredns-7db6d8ff4d-glz8r" Jul 2 11:11:36.626060 kubelet[2596]: I0702 11:11:36.625601 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/7f11a122-d563-4cfc-ba9d-d1495c79de02-config-volume\") pod \"coredns-7db6d8ff4d-glz8r\" (UID: \"7f11a122-d563-4cfc-ba9d-d1495c79de02\") " pod="kube-system/coredns-7db6d8ff4d-glz8r" Jul 2 11:11:36.626060 kubelet[2596]: I0702 11:11:36.625650 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3f2cbe57-39ba-405a-995f-373cd9bf3043-tigera-ca-bundle\") pod \"calico-kube-controllers-8c87778f6-5nk9g\" (UID: \"3f2cbe57-39ba-405a-995f-373cd9bf3043\") " pod="calico-system/calico-kube-controllers-8c87778f6-5nk9g" Jul 2 11:11:36.978008 env[1554]: time="2024-07-02T11:11:36.977875531Z" level=info msg="shim disconnected" id=4d07edf97c50391327e552926ca0d982f2238e42e10051a26cff1a677d81e709 Jul 2 11:11:36.978008 env[1554]: time="2024-07-02T11:11:36.977970617Z" level=warning msg="cleaning up after shim disconnected" id=4d07edf97c50391327e552926ca0d982f2238e42e10051a26cff1a677d81e709 namespace=k8s.io Jul 2 11:11:36.978008 env[1554]: time="2024-07-02T11:11:36.977997127Z" level=info msg="cleaning up dead shim" Jul 2 11:11:36.993681 env[1554]: time="2024-07-02T11:11:36.993566218Z" level=warning msg="cleanup warnings time=\"2024-07-02T11:11:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3378 runtime=io.containerd.runc.v2\n" Jul 2 11:11:37.038596 systemd[1]: Created slice kubepods-besteffort-podb09791f9_8fe4_4c17_ac3e_a51fe3faea00.slice. Jul 2 11:11:37.043556 env[1554]: time="2024-07-02T11:11:37.043440041Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dfvxs,Uid:b09791f9-8fe4-4c17-ac3e-a51fe3faea00,Namespace:calico-system,Attempt:0,}" Jul 2 11:11:37.045639 env[1554]: time="2024-07-02T11:11:37.045527761Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-nwl4c,Uid:f19dcd14-bc5e-4b10-bf51-921794a62686,Namespace:kube-system,Attempt:0,}" Jul 2 11:11:37.050722 env[1554]: time="2024-07-02T11:11:37.050622428Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-glz8r,Uid:7f11a122-d563-4cfc-ba9d-d1495c79de02,Namespace:kube-system,Attempt:0,}" Jul 2 11:11:37.053968 env[1554]: time="2024-07-02T11:11:37.053870865Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8c87778f6-5nk9g,Uid:3f2cbe57-39ba-405a-995f-373cd9bf3043,Namespace:calico-system,Attempt:0,}" Jul 2 11:11:37.107474 env[1554]: time="2024-07-02T11:11:37.107441686Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 11:11:37.111751 env[1554]: time="2024-07-02T11:11:37.111700333Z" level=error msg="Failed to destroy network for sandbox \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:37.111948 env[1554]: time="2024-07-02T11:11:37.111931147Z" level=error msg="encountered an error cleaning up failed sandbox \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:37.111978 env[1554]: time="2024-07-02T11:11:37.111964030Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-nwl4c,Uid:f19dcd14-bc5e-4b10-bf51-921794a62686,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:37.112121 kubelet[2596]: E0702 11:11:37.112091 2596 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:37.112185 kubelet[2596]: E0702 11:11:37.112145 2596 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-nwl4c" Jul 2 11:11:37.112185 kubelet[2596]: E0702 11:11:37.112160 2596 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-nwl4c" Jul 2 11:11:37.112241 kubelet[2596]: E0702 11:11:37.112191 2596 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-nwl4c_kube-system(f19dcd14-bc5e-4b10-bf51-921794a62686)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-nwl4c_kube-system(f19dcd14-bc5e-4b10-bf51-921794a62686)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-nwl4c" podUID="f19dcd14-bc5e-4b10-bf51-921794a62686" Jul 2 11:11:37.112687 env[1554]: time="2024-07-02T11:11:37.112638091Z" level=error msg="Failed to destroy network for sandbox \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:37.112854 env[1554]: time="2024-07-02T11:11:37.112813778Z" level=error msg="encountered an error cleaning up failed sandbox \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:37.112854 env[1554]: time="2024-07-02T11:11:37.112841196Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dfvxs,Uid:b09791f9-8fe4-4c17-ac3e-a51fe3faea00,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:37.112948 kubelet[2596]: E0702 11:11:37.112927 2596 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:37.112998 kubelet[2596]: E0702 11:11:37.112956 2596 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dfvxs" Jul 2 11:11:37.112998 kubelet[2596]: E0702 11:11:37.112974 2596 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-dfvxs" Jul 2 11:11:37.113059 kubelet[2596]: E0702 11:11:37.112995 2596 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-dfvxs_calico-system(b09791f9-8fe4-4c17-ac3e-a51fe3faea00)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-dfvxs_calico-system(b09791f9-8fe4-4c17-ac3e-a51fe3faea00)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dfvxs" podUID="b09791f9-8fe4-4c17-ac3e-a51fe3faea00" Jul 2 11:11:37.114643 env[1554]: time="2024-07-02T11:11:37.114618034Z" level=error msg="Failed to destroy network for sandbox \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:37.114841 env[1554]: time="2024-07-02T11:11:37.114799003Z" level=error msg="encountered an error cleaning up failed sandbox \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:37.114841 env[1554]: time="2024-07-02T11:11:37.114824602Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-glz8r,Uid:7f11a122-d563-4cfc-ba9d-d1495c79de02,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:37.114945 kubelet[2596]: E0702 11:11:37.114902 2596 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:37.114945 kubelet[2596]: E0702 11:11:37.114925 2596 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-glz8r" Jul 2 11:11:37.114945 kubelet[2596]: E0702 11:11:37.114937 2596 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-glz8r" Jul 2 11:11:37.115052 kubelet[2596]: E0702 11:11:37.114957 2596 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-glz8r_kube-system(7f11a122-d563-4cfc-ba9d-d1495c79de02)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-glz8r_kube-system(7f11a122-d563-4cfc-ba9d-d1495c79de02)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-glz8r" podUID="7f11a122-d563-4cfc-ba9d-d1495c79de02" Jul 2 11:11:37.117201 env[1554]: time="2024-07-02T11:11:37.117173569Z" level=error msg="Failed to destroy network for sandbox \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:37.117405 env[1554]: time="2024-07-02T11:11:37.117358303Z" level=error msg="encountered an error cleaning up failed sandbox \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:37.117405 env[1554]: time="2024-07-02T11:11:37.117387805Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8c87778f6-5nk9g,Uid:3f2cbe57-39ba-405a-995f-373cd9bf3043,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:37.117508 kubelet[2596]: E0702 11:11:37.117482 2596 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:37.117553 kubelet[2596]: E0702 11:11:37.117516 2596 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-8c87778f6-5nk9g" Jul 2 11:11:37.117553 kubelet[2596]: E0702 11:11:37.117537 2596 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-8c87778f6-5nk9g" Jul 2 11:11:37.117621 kubelet[2596]: E0702 11:11:37.117569 2596 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-8c87778f6-5nk9g_calico-system(3f2cbe57-39ba-405a-995f-373cd9bf3043)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-8c87778f6-5nk9g_calico-system(3f2cbe57-39ba-405a-995f-373cd9bf3043)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-8c87778f6-5nk9g" podUID="3f2cbe57-39ba-405a-995f-373cd9bf3043" Jul 2 11:11:37.757906 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6-shm.mount: Deactivated successfully. Jul 2 11:11:37.757957 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822-shm.mount: Deactivated successfully. Jul 2 11:11:37.757991 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab-shm.mount: Deactivated successfully. Jul 2 11:11:37.758022 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d-shm.mount: Deactivated successfully. Jul 2 11:11:38.111093 kubelet[2596]: I0702 11:11:38.110913 2596 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Jul 2 11:11:38.112357 env[1554]: time="2024-07-02T11:11:38.112256575Z" level=info msg="StopPodSandbox for \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\"" Jul 2 11:11:38.113147 kubelet[2596]: I0702 11:11:38.112828 2596 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Jul 2 11:11:38.114062 env[1554]: time="2024-07-02T11:11:38.113989923Z" level=info msg="StopPodSandbox for \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\"" Jul 2 11:11:38.115155 kubelet[2596]: I0702 11:11:38.115112 2596 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Jul 2 11:11:38.116261 env[1554]: time="2024-07-02T11:11:38.116191860Z" level=info msg="StopPodSandbox for \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\"" Jul 2 11:11:38.117626 kubelet[2596]: I0702 11:11:38.117559 2596 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Jul 2 11:11:38.118737 env[1554]: time="2024-07-02T11:11:38.118645989Z" level=info msg="StopPodSandbox for \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\"" Jul 2 11:11:38.152206 env[1554]: time="2024-07-02T11:11:38.152140433Z" level=error msg="StopPodSandbox for \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\" failed" error="failed to destroy network for sandbox \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:38.152415 kubelet[2596]: E0702 11:11:38.152372 2596 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Jul 2 11:11:38.152509 kubelet[2596]: E0702 11:11:38.152433 2596 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6"} Jul 2 11:11:38.152509 kubelet[2596]: E0702 11:11:38.152490 2596 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3f2cbe57-39ba-405a-995f-373cd9bf3043\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 11:11:38.152672 kubelet[2596]: E0702 11:11:38.152513 2596 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3f2cbe57-39ba-405a-995f-373cd9bf3043\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-8c87778f6-5nk9g" podUID="3f2cbe57-39ba-405a-995f-373cd9bf3043" Jul 2 11:11:38.152782 env[1554]: time="2024-07-02T11:11:38.152649465Z" level=error msg="StopPodSandbox for \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\" failed" error="failed to destroy network for sandbox \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:38.152860 kubelet[2596]: E0702 11:11:38.152771 2596 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Jul 2 11:11:38.152860 kubelet[2596]: E0702 11:11:38.152801 2596 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822"} Jul 2 11:11:38.152860 kubelet[2596]: E0702 11:11:38.152826 2596 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7f11a122-d563-4cfc-ba9d-d1495c79de02\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 11:11:38.152860 kubelet[2596]: E0702 11:11:38.152845 2596 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7f11a122-d563-4cfc-ba9d-d1495c79de02\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-glz8r" podUID="7f11a122-d563-4cfc-ba9d-d1495c79de02" Jul 2 11:11:38.153667 env[1554]: time="2024-07-02T11:11:38.153589126Z" level=error msg="StopPodSandbox for \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\" failed" error="failed to destroy network for sandbox \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:38.153799 kubelet[2596]: E0702 11:11:38.153736 2596 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Jul 2 11:11:38.153799 kubelet[2596]: E0702 11:11:38.153783 2596 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d"} Jul 2 11:11:38.153877 kubelet[2596]: E0702 11:11:38.153808 2596 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b09791f9-8fe4-4c17-ac3e-a51fe3faea00\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 11:11:38.153877 kubelet[2596]: E0702 11:11:38.153824 2596 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b09791f9-8fe4-4c17-ac3e-a51fe3faea00\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-dfvxs" podUID="b09791f9-8fe4-4c17-ac3e-a51fe3faea00" Jul 2 11:11:38.154071 env[1554]: time="2024-07-02T11:11:38.154045728Z" level=error msg="StopPodSandbox for \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\" failed" error="failed to destroy network for sandbox \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 11:11:38.154164 kubelet[2596]: E0702 11:11:38.154147 2596 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Jul 2 11:11:38.154200 kubelet[2596]: E0702 11:11:38.154171 2596 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab"} Jul 2 11:11:38.154200 kubelet[2596]: E0702 11:11:38.154195 2596 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f19dcd14-bc5e-4b10-bf51-921794a62686\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 11:11:38.154294 kubelet[2596]: E0702 11:11:38.154211 2596 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f19dcd14-bc5e-4b10-bf51-921794a62686\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-nwl4c" podUID="f19dcd14-bc5e-4b10-bf51-921794a62686" Jul 2 11:11:38.609551 kubelet[2596]: I0702 11:11:38.609451 2596 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 11:11:38.630000 audit[3725]: NETFILTER_CFG table=filter:93 family=2 entries=15 op=nft_register_rule pid=3725 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:38.630000 audit[3725]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffda9b64020 a2=0 a3=7ffda9b6400c items=0 ppid=2850 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:38.630000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:38.649000 audit[3725]: NETFILTER_CFG table=nat:94 family=2 entries=19 op=nft_register_chain pid=3725 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:38.649000 audit[3725]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffda9b64020 a2=0 a3=7ffda9b6400c items=0 ppid=2850 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:38.649000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:40.961852 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3170116936.mount: Deactivated successfully. Jul 2 11:11:40.978673 env[1554]: time="2024-07-02T11:11:40.978653213Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:40.979183 env[1554]: time="2024-07-02T11:11:40.979171121Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:40.979810 env[1554]: time="2024-07-02T11:11:40.979786474Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:40.980537 env[1554]: time="2024-07-02T11:11:40.980523418Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:40.980825 env[1554]: time="2024-07-02T11:11:40.980810895Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:4e42b6f329bc1d197d97f6d2a1289b9e9f4a9560db3a36c8cffb5e95e64e4b49\"" Jul 2 11:11:40.997062 env[1554]: time="2024-07-02T11:11:40.997045018Z" level=info msg="CreateContainer within sandbox \"73ee5c5c5832a0b846ee9c133261191a0803f89b5e641bd5cb5c6dfd99568785\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 11:11:41.005402 env[1554]: time="2024-07-02T11:11:41.005258061Z" level=info msg="CreateContainer within sandbox \"73ee5c5c5832a0b846ee9c133261191a0803f89b5e641bd5cb5c6dfd99568785\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f132b01a128369cd9d1aefeb26e01c1c831cd277ef43e2f2cad792eb1d4939fb\"" Jul 2 11:11:41.005890 env[1554]: time="2024-07-02T11:11:41.005867449Z" level=info msg="StartContainer for \"f132b01a128369cd9d1aefeb26e01c1c831cd277ef43e2f2cad792eb1d4939fb\"" Jul 2 11:11:41.015046 systemd[1]: Started cri-containerd-f132b01a128369cd9d1aefeb26e01c1c831cd277ef43e2f2cad792eb1d4939fb.scope. Jul 2 11:11:41.023000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.052194 kernel: kauditd_printk_skb: 40 callbacks suppressed Jul 2 11:11:41.052252 kernel: audit: type=1400 audit(1719918701.023:982): avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.023000 audit[3735]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f17593c1aa8 items=0 ppid=3126 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:41.213962 kernel: audit: type=1300 audit(1719918701.023:982): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f17593c1aa8 items=0 ppid=3126 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:41.214001 kernel: audit: type=1327 audit(1719918701.023:982): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333262303161313238333639636439643161656665623236653031 Jul 2 11:11:41.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333262303161313238333639636439643161656665623236653031 Jul 2 11:11:41.307537 kernel: audit: type=1400 audit(1719918701.023:983): avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.023000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.371191 kernel: audit: type=1400 audit(1719918701.023:983): avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.023000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.434750 kernel: audit: type=1400 audit(1719918701.023:983): avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.023000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.498282 kernel: audit: type=1400 audit(1719918701.023:983): avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.023000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.562202 kernel: audit: type=1400 audit(1719918701.023:983): avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.023000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.568175 env[1554]: time="2024-07-02T11:11:41.568125024Z" level=info msg="StartContainer for \"f132b01a128369cd9d1aefeb26e01c1c831cd277ef43e2f2cad792eb1d4939fb\" returns successfully" Jul 2 11:11:41.626265 kernel: audit: type=1400 audit(1719918701.023:983): avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.023000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.690149 kernel: audit: type=1400 audit(1719918701.023:983): avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.023000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.023000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.023000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.023000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.023000 audit: BPF prog-id=133 op=LOAD Jul 2 11:11:41.023000 audit[3735]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000d7ba8 items=0 ppid=3126 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:41.023000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333262303161313238333639636439643161656665623236653031 Jul 2 11:11:41.212000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.212000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.212000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.212000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.212000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.212000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.212000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.212000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.212000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.212000 audit: BPF prog-id=134 op=LOAD Jul 2 11:11:41.212000 audit[3735]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000d7bf8 items=0 ppid=3126 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:41.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333262303161313238333639636439643161656665623236653031 Jul 2 11:11:41.369000 audit: BPF prog-id=134 op=UNLOAD Jul 2 11:11:41.369000 audit: BPF prog-id=133 op=UNLOAD Jul 2 11:11:41.369000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.369000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.369000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.369000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.369000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.369000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.369000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.369000 audit[3735]: AVC avc: denied { perfmon } for pid=3735 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.369000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.369000 audit[3735]: AVC avc: denied { bpf } for pid=3735 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:41.369000 audit: BPF prog-id=135 op=LOAD Jul 2 11:11:41.369000 audit[3735]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000d7c88 items=0 ppid=3126 pid=3735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:41.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631333262303161313238333639636439643161656665623236653031 Jul 2 11:11:41.838346 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 11:11:41.838385 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 11:11:42.156373 kubelet[2596]: I0702 11:11:42.156249 2596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-slmqj" podStartSLOduration=2.462254854 podStartE2EDuration="16.156214963s" podCreationTimestamp="2024-07-02 11:11:26 +0000 UTC" firstStartedPulling="2024-07-02 11:11:27.287293164 +0000 UTC m=+19.324971987" lastFinishedPulling="2024-07-02 11:11:40.981253269 +0000 UTC m=+33.018932096" observedRunningTime="2024-07-02 11:11:42.155628233 +0000 UTC m=+34.193307149" watchObservedRunningTime="2024-07-02 11:11:42.156214963 +0000 UTC m=+34.193893828" Jul 2 11:11:42.983000 audit[3867]: AVC avc: denied { write } for pid=3867 comm="tee" name="fd" dev="proc" ino=32585 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 11:11:42.983000 audit[3865]: AVC avc: denied { write } for pid=3865 comm="tee" name="fd" dev="proc" ino=29601 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 11:11:42.983000 audit[3865]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc991e9a00 a2=241 a3=1b6 items=1 ppid=3827 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:42.983000 audit[3867]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4884aa10 a2=241 a3=1b6 items=1 ppid=3823 pid=3867 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:42.983000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 11:11:42.983000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 11:11:42.983000 audit[3859]: AVC avc: denied { write } for pid=3859 comm="tee" name="fd" dev="proc" ino=36027 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 11:11:42.983000 audit: PATH item=0 name="/dev/fd/63" inode=29598 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:11:42.983000 audit: PATH item=0 name="/dev/fd/63" inode=36024 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:11:42.983000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 11:11:42.983000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 11:11:42.983000 audit[3859]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffefbaa8a12 a2=241 a3=1b6 items=1 ppid=3820 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:42.983000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 11:11:42.983000 audit: PATH item=0 name="/dev/fd/63" inode=18429 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:11:42.983000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 11:11:42.983000 audit[3858]: AVC avc: denied { write } for pid=3858 comm="tee" name="fd" dev="proc" ino=15231 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 11:11:42.983000 audit[3860]: AVC avc: denied { write } for pid=3860 comm="tee" name="fd" dev="proc" ino=33333 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 11:11:42.983000 audit[3858]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffec0cf7a01 a2=241 a3=1b6 items=1 ppid=3824 pid=3858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:42.983000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 11:11:42.983000 audit: PATH item=0 name="/dev/fd/63" inode=32582 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:11:42.983000 audit[3860]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff89acfa11 a2=241 a3=1b6 items=1 ppid=3822 pid=3860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:42.983000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 11:11:42.983000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 11:11:42.983000 audit: PATH item=0 name="/dev/fd/63" inode=33330 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:11:42.983000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 11:11:42.983000 audit[3868]: AVC avc: denied { write } for pid=3868 comm="tee" name="fd" dev="proc" ino=30363 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 11:11:42.983000 audit[3868]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6bfa9a10 a2=241 a3=1b6 items=1 ppid=3821 pid=3868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:42.983000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 11:11:42.983000 audit: PATH item=0 name="/dev/fd/63" inode=30360 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:11:42.983000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 11:11:42.984000 audit[3866]: AVC avc: denied { write } for pid=3866 comm="tee" name="fd" dev="proc" ino=15235 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 11:11:42.984000 audit[3866]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd7dc2a10 a2=241 a3=1b6 items=1 ppid=3826 pid=3866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:42.984000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 11:11:42.984000 audit: PATH item=0 name="/dev/fd/63" inode=15228 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 11:11:42.984000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit: BPF prog-id=136 op=LOAD Jul 2 11:11:43.075000 audit[3998]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe416d4c10 a2=70 a3=7fcf2c4f1000 items=0 ppid=3829 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:43.075000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:11:43.075000 audit: BPF prog-id=136 op=UNLOAD Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.075000 audit: BPF prog-id=137 op=LOAD Jul 2 11:11:43.075000 audit[3998]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe416d4c10 a2=70 a3=6f items=0 ppid=3829 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:43.075000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:11:43.076000 audit: BPF prog-id=137 op=UNLOAD Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe416d4bc0 a2=70 a3=7ffe416d4c10 items=0 ppid=3829 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:43.076000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit: BPF prog-id=138 op=LOAD Jul 2 11:11:43.076000 audit[3998]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffe416d4ba0 a2=70 a3=7ffe416d4c10 items=0 ppid=3829 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:43.076000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:11:43.076000 audit: BPF prog-id=138 op=UNLOAD Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe416d4c80 a2=70 a3=0 items=0 ppid=3829 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:43.076000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe416d4c70 a2=70 a3=0 items=0 ppid=3829 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:43.076000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe416d4be0 a2=70 a3=0 items=0 ppid=3829 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:43.076000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe416d4cb0 a2=70 a3=25138b0 items=0 ppid=3829 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:43.076000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe416d4cb0 a2=70 a3=2510880 items=0 ppid=3829 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:43.076000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { perfmon } for pid=3998 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit[3998]: AVC avc: denied { bpf } for pid=3998 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.076000 audit: BPF prog-id=139 op=LOAD Jul 2 11:11:43.076000 audit[3998]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe416d4bd0 a2=70 a3=0 items=0 ppid=3829 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:43.076000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 11:11:43.077176 systemd-networkd[1298]: vxlan.calico: Link UP Jul 2 11:11:43.077179 systemd-networkd[1298]: vxlan.calico: Gained carrier Jul 2 11:11:43.077000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.077000 audit[4005]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffca10acf60 a2=70 a3=fff80800 items=0 ppid=3829 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:43.077000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 11:11:43.077000 audit[4005]: AVC avc: denied { bpf } for pid=4005 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:43.077000 audit[4005]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffca10ace30 a2=70 a3=3 items=0 ppid=3829 pid=4005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:43.077000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 11:11:43.086000 audit: BPF prog-id=139 op=UNLOAD Jul 2 11:11:43.119000 audit[4061]: NETFILTER_CFG table=mangle:95 family=2 entries=16 op=nft_register_chain pid=4061 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:11:43.119000 audit[4061]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc421a1730 a2=0 a3=7ffc421a171c items=0 ppid=3829 pid=4061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:43.119000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:11:43.122000 audit[4059]: NETFILTER_CFG table=raw:96 family=2 entries=19 op=nft_register_chain pid=4059 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:11:43.122000 audit[4059]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffc8b7687d0 a2=0 a3=7ffc8b7687bc items=0 ppid=3829 pid=4059 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:43.122000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:11:43.122000 audit[4060]: NETFILTER_CFG table=nat:97 family=2 entries=15 op=nft_register_chain pid=4060 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:11:43.122000 audit[4060]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc15cb0bd0 a2=0 a3=7ffc15cb0bbc items=0 ppid=3829 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:43.122000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:11:43.124000 audit[4064]: NETFILTER_CFG table=filter:98 family=2 entries=39 op=nft_register_chain pid=4064 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:11:43.124000 audit[4064]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffc0b9e0500 a2=0 a3=7ffc0b9e04ec items=0 ppid=3829 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:43.124000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:11:43.131398 kubelet[2596]: I0702 11:11:43.131351 2596 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 11:11:43.765231 systemd[1]: Started sshd@7-147.75.203.5:22-112.54.220.94:49318.service. Jul 2 11:11:43.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.203.5:22-112.54.220.94:49318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:11:44.334589 systemd-networkd[1298]: vxlan.calico: Gained IPv6LL Jul 2 11:11:46.429303 sshd[4069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.54.220.94 user=root Jul 2 11:11:46.428000 audit[4069]: USER_AUTH pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=112.54.220.94 addr=112.54.220.94 terminal=ssh res=failed' Jul 2 11:11:46.456420 kernel: kauditd_printk_skb: 158 callbacks suppressed Jul 2 11:11:46.456484 kernel: audit: type=1100 audit(1719918706.428:1016): pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=112.54.220.94 addr=112.54.220.94 terminal=ssh res=failed' Jul 2 11:11:48.503116 sshd[4069]: Failed password for root from 112.54.220.94 port 49318 ssh2 Jul 2 11:11:48.830000 audit[4069]: USER_AUTH pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=112.54.220.94 addr=112.54.220.94 terminal=ssh res=failed' Jul 2 11:11:48.920467 kernel: audit: type=1100 audit(1719918708.830:1017): pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=112.54.220.94 addr=112.54.220.94 terminal=ssh res=failed' Jul 2 11:11:50.026715 env[1554]: time="2024-07-02T11:11:50.026623295Z" level=info msg="StopPodSandbox for \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\"" Jul 2 11:11:50.079215 env[1554]: 2024-07-02 11:11:50.063 [INFO][4100] k8s.go 608: Cleaning up netns ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Jul 2 11:11:50.079215 env[1554]: 2024-07-02 11:11:50.063 [INFO][4100] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" iface="eth0" netns="/var/run/netns/cni-1864cede-5aea-f243-7819-112709391bc4" Jul 2 11:11:50.079215 env[1554]: 2024-07-02 11:11:50.063 [INFO][4100] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" iface="eth0" netns="/var/run/netns/cni-1864cede-5aea-f243-7819-112709391bc4" Jul 2 11:11:50.079215 env[1554]: 2024-07-02 11:11:50.063 [INFO][4100] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" iface="eth0" netns="/var/run/netns/cni-1864cede-5aea-f243-7819-112709391bc4" Jul 2 11:11:50.079215 env[1554]: 2024-07-02 11:11:50.063 [INFO][4100] k8s.go 615: Releasing IP address(es) ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Jul 2 11:11:50.079215 env[1554]: 2024-07-02 11:11:50.063 [INFO][4100] utils.go 188: Calico CNI releasing IP address ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Jul 2 11:11:50.079215 env[1554]: 2024-07-02 11:11:50.072 [INFO][4115] ipam_plugin.go 411: Releasing address using handleID ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" HandleID="k8s-pod-network.0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" Jul 2 11:11:50.079215 env[1554]: 2024-07-02 11:11:50.072 [INFO][4115] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:11:50.079215 env[1554]: 2024-07-02 11:11:50.072 [INFO][4115] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:11:50.079215 env[1554]: 2024-07-02 11:11:50.076 [WARNING][4115] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" HandleID="k8s-pod-network.0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" Jul 2 11:11:50.079215 env[1554]: 2024-07-02 11:11:50.076 [INFO][4115] ipam_plugin.go 439: Releasing address using workloadID ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" HandleID="k8s-pod-network.0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" Jul 2 11:11:50.079215 env[1554]: 2024-07-02 11:11:50.077 [INFO][4115] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:11:50.079215 env[1554]: 2024-07-02 11:11:50.078 [INFO][4100] k8s.go 621: Teardown processing complete. ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Jul 2 11:11:50.079536 env[1554]: time="2024-07-02T11:11:50.079304128Z" level=info msg="TearDown network for sandbox \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\" successfully" Jul 2 11:11:50.079536 env[1554]: time="2024-07-02T11:11:50.079332122Z" level=info msg="StopPodSandbox for \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\" returns successfully" Jul 2 11:11:50.079764 env[1554]: time="2024-07-02T11:11:50.079722350Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-nwl4c,Uid:f19dcd14-bc5e-4b10-bf51-921794a62686,Namespace:kube-system,Attempt:1,}" Jul 2 11:11:50.080737 systemd[1]: run-netns-cni\x2d1864cede\x2d5aea\x2df243\x2d7819\x2d112709391bc4.mount: Deactivated successfully. Jul 2 11:11:50.172694 systemd-networkd[1298]: cali708fb0dc2c2: Link UP Jul 2 11:11:50.176297 sshd[4069]: Failed password for root from 112.54.220.94 port 49318 ssh2 Jul 2 11:11:50.228342 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 11:11:50.228378 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali708fb0dc2c2: link becomes ready Jul 2 11:11:50.228459 systemd-networkd[1298]: cali708fb0dc2c2: Gained carrier Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.134 [INFO][4131] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0 coredns-7db6d8ff4d- kube-system f19dcd14-bc5e-4b10-bf51-921794a62686 704 0 2024-07-02 11:11:21 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.5-a-18871bf0db coredns-7db6d8ff4d-nwl4c eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali708fb0dc2c2 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" Namespace="kube-system" Pod="coredns-7db6d8ff4d-nwl4c" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-" Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.134 [INFO][4131] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" Namespace="kube-system" Pod="coredns-7db6d8ff4d-nwl4c" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.148 [INFO][4154] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" HandleID="k8s-pod-network.9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.154 [INFO][4154] ipam_plugin.go 264: Auto assigning IP ContainerID="9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" HandleID="k8s-pod-network.9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000325140), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.5-a-18871bf0db", "pod":"coredns-7db6d8ff4d-nwl4c", "timestamp":"2024-07-02 11:11:50.148166567 +0000 UTC"}, Hostname:"ci-3510.3.5-a-18871bf0db", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.154 [INFO][4154] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.154 [INFO][4154] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.154 [INFO][4154] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-18871bf0db' Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.155 [INFO][4154] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.158 [INFO][4154] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.161 [INFO][4154] ipam.go 489: Trying affinity for 192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.162 [INFO][4154] ipam.go 155: Attempting to load block cidr=192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.164 [INFO][4154] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.164 [INFO][4154] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.0/26 handle="k8s-pod-network.9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.165 [INFO][4154] ipam.go 1685: Creating new handle: k8s-pod-network.9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774 Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.167 [INFO][4154] ipam.go 1203: Writing block in order to claim IPs block=192.168.17.0/26 handle="k8s-pod-network.9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.170 [INFO][4154] ipam.go 1216: Successfully claimed IPs: [192.168.17.1/26] block=192.168.17.0/26 handle="k8s-pod-network.9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.170 [INFO][4154] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.1/26] handle="k8s-pod-network.9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.170 [INFO][4154] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:11:50.233597 env[1554]: 2024-07-02 11:11:50.170 [INFO][4154] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.17.1/26] IPv6=[] ContainerID="9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" HandleID="k8s-pod-network.9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" Jul 2 11:11:50.234050 env[1554]: 2024-07-02 11:11:50.171 [INFO][4131] k8s.go 386: Populated endpoint ContainerID="9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" Namespace="kube-system" Pod="coredns-7db6d8ff4d-nwl4c" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"f19dcd14-bc5e-4b10-bf51-921794a62686", ResourceVersion:"704", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 11, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"", Pod:"coredns-7db6d8ff4d-nwl4c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.17.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali708fb0dc2c2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:11:50.234050 env[1554]: 2024-07-02 11:11:50.172 [INFO][4131] k8s.go 387: Calico CNI using IPs: [192.168.17.1/32] ContainerID="9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" Namespace="kube-system" Pod="coredns-7db6d8ff4d-nwl4c" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" Jul 2 11:11:50.234050 env[1554]: 2024-07-02 11:11:50.172 [INFO][4131] dataplane_linux.go 68: Setting the host side veth name to cali708fb0dc2c2 ContainerID="9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" Namespace="kube-system" Pod="coredns-7db6d8ff4d-nwl4c" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" Jul 2 11:11:50.234050 env[1554]: 2024-07-02 11:11:50.228 [INFO][4131] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" Namespace="kube-system" Pod="coredns-7db6d8ff4d-nwl4c" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" Jul 2 11:11:50.234050 env[1554]: 2024-07-02 11:11:50.228 [INFO][4131] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" Namespace="kube-system" Pod="coredns-7db6d8ff4d-nwl4c" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"f19dcd14-bc5e-4b10-bf51-921794a62686", ResourceVersion:"704", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 11, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774", Pod:"coredns-7db6d8ff4d-nwl4c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.17.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali708fb0dc2c2", MAC:"76:07:6c:70:30:0e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:11:50.234050 env[1554]: 2024-07-02 11:11:50.232 [INFO][4131] k8s.go 500: Wrote updated endpoint to datastore ContainerID="9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774" Namespace="kube-system" Pod="coredns-7db6d8ff4d-nwl4c" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" Jul 2 11:11:50.238787 env[1554]: time="2024-07-02T11:11:50.238756538Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:11:50.238787 env[1554]: time="2024-07-02T11:11:50.238778347Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:11:50.238908 env[1554]: time="2024-07-02T11:11:50.238788766Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:11:50.238908 env[1554]: time="2024-07-02T11:11:50.238867367Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774 pid=4194 runtime=io.containerd.runc.v2 Jul 2 11:11:50.237000 audit[4196]: NETFILTER_CFG table=filter:99 family=2 entries=34 op=nft_register_chain pid=4196 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:11:50.245792 systemd[1]: Started cri-containerd-9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774.scope. Jul 2 11:11:50.297319 kernel: audit: type=1325 audit(1719918710.237:1018): table=filter:99 family=2 entries=34 op=nft_register_chain pid=4196 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:11:50.297368 kernel: audit: type=1300 audit(1719918710.237:1018): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff786f3fe0 a2=0 a3=7fff786f3fcc items=0 ppid=3829 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:50.237000 audit[4196]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7fff786f3fe0 a2=0 a3=7fff786f3fcc items=0 ppid=3829 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:50.237000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:11:50.454223 kernel: audit: type=1327 audit(1719918710.237:1018): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:11:50.454253 kernel: audit: type=1400 audit(1719918710.303:1019): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.516670 kernel: audit: type=1400 audit(1719918710.303:1020): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.579053 kernel: audit: type=1400 audit(1719918710.303:1021): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.641527 kernel: audit: type=1400 audit(1719918710.303:1022): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.704569 kernel: audit: type=1400 audit(1719918710.303:1023): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.453000 audit: BPF prog-id=140 op=LOAD Jul 2 11:11:50.453000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.453000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4194 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:50.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962663365653639663536306266363263313738363032323531326465 Jul 2 11:11:50.453000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.453000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4194 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:50.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962663365653639663536306266363263313738363032323531326465 Jul 2 11:11:50.453000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.453000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.453000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.453000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.453000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.453000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.453000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.453000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.453000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.453000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.453000 audit: BPF prog-id=141 op=LOAD Jul 2 11:11:50.453000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000308ba0 items=0 ppid=4194 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:50.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962663365653639663536306266363263313738363032323531326465 Jul 2 11:11:50.578000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.578000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.578000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.578000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.578000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.578000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.578000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.578000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.578000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.578000 audit: BPF prog-id=142 op=LOAD Jul 2 11:11:50.578000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000308be8 items=0 ppid=4194 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:50.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962663365653639663536306266363263313738363032323531326465 Jul 2 11:11:50.703000 audit: BPF prog-id=142 op=UNLOAD Jul 2 11:11:50.703000 audit: BPF prog-id=141 op=UNLOAD Jul 2 11:11:50.703000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.703000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.703000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.703000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.703000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.703000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.703000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.703000 audit[4207]: AVC avc: denied { perfmon } for pid=4207 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.703000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.703000 audit[4207]: AVC avc: denied { bpf } for pid=4207 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.703000 audit: BPF prog-id=143 op=LOAD Jul 2 11:11:50.703000 audit[4207]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000308ff8 items=0 ppid=4194 pid=4207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:50.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962663365653639663536306266363263313738363032323531326465 Jul 2 11:11:50.783645 env[1554]: time="2024-07-02T11:11:50.783618793Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-nwl4c,Uid:f19dcd14-bc5e-4b10-bf51-921794a62686,Namespace:kube-system,Attempt:1,} returns sandbox id \"9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774\"" Jul 2 11:11:50.784846 env[1554]: time="2024-07-02T11:11:50.784832361Z" level=info msg="CreateContainer within sandbox \"9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 11:11:50.789582 env[1554]: time="2024-07-02T11:11:50.789541955Z" level=info msg="CreateContainer within sandbox \"9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9666115ff72622a8ee54e233458c5327e585fd08a2d70872fb500ef8c63c75e5\"" Jul 2 11:11:50.789796 env[1554]: time="2024-07-02T11:11:50.789740928Z" level=info msg="StartContainer for \"9666115ff72622a8ee54e233458c5327e585fd08a2d70872fb500ef8c63c75e5\"" Jul 2 11:11:50.797198 systemd[1]: Started cri-containerd-9666115ff72622a8ee54e233458c5327e585fd08a2d70872fb500ef8c63c75e5.scope. Jul 2 11:11:50.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit: BPF prog-id=144 op=LOAD Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4194 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:50.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936363631313566663732363232613865653534653233333435386335 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4194 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:50.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936363631313566663732363232613865653534653233333435386335 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit: BPF prog-id=145 op=LOAD Jul 2 11:11:50.802000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00032cb20 items=0 ppid=4194 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:50.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936363631313566663732363232613865653534653233333435386335 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit: BPF prog-id=146 op=LOAD Jul 2 11:11:50.802000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00032cb68 items=0 ppid=4194 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:50.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936363631313566663732363232613865653534653233333435386335 Jul 2 11:11:50.802000 audit: BPF prog-id=146 op=UNLOAD Jul 2 11:11:50.802000 audit: BPF prog-id=145 op=UNLOAD Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { perfmon } for pid=4235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit[4235]: AVC avc: denied { bpf } for pid=4235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:50.802000 audit: BPF prog-id=147 op=LOAD Jul 2 11:11:50.802000 audit[4235]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00032cf78 items=0 ppid=4194 pid=4235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:50.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936363631313566663732363232613865653534653233333435386335 Jul 2 11:11:50.809559 env[1554]: time="2024-07-02T11:11:50.809512460Z" level=info msg="StartContainer for \"9666115ff72622a8ee54e233458c5327e585fd08a2d70872fb500ef8c63c75e5\" returns successfully" Jul 2 11:11:51.026718 env[1554]: time="2024-07-02T11:11:51.026605518Z" level=info msg="StopPodSandbox for \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\"" Jul 2 11:11:51.026718 env[1554]: time="2024-07-02T11:11:51.026619807Z" level=info msg="StopPodSandbox for \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\"" Jul 2 11:11:51.121841 env[1554]: 2024-07-02 11:11:51.095 [INFO][4309] k8s.go 608: Cleaning up netns ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Jul 2 11:11:51.121841 env[1554]: 2024-07-02 11:11:51.095 [INFO][4309] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" iface="eth0" netns="/var/run/netns/cni-91adaab8-e9ab-7428-d16e-9bd6b2777e8d" Jul 2 11:11:51.121841 env[1554]: 2024-07-02 11:11:51.096 [INFO][4309] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" iface="eth0" netns="/var/run/netns/cni-91adaab8-e9ab-7428-d16e-9bd6b2777e8d" Jul 2 11:11:51.121841 env[1554]: 2024-07-02 11:11:51.096 [INFO][4309] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" iface="eth0" netns="/var/run/netns/cni-91adaab8-e9ab-7428-d16e-9bd6b2777e8d" Jul 2 11:11:51.121841 env[1554]: 2024-07-02 11:11:51.096 [INFO][4309] k8s.go 615: Releasing IP address(es) ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Jul 2 11:11:51.121841 env[1554]: 2024-07-02 11:11:51.096 [INFO][4309] utils.go 188: Calico CNI releasing IP address ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Jul 2 11:11:51.121841 env[1554]: 2024-07-02 11:11:51.112 [INFO][4346] ipam_plugin.go 411: Releasing address using handleID ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" HandleID="k8s-pod-network.8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Workload="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" Jul 2 11:11:51.121841 env[1554]: 2024-07-02 11:11:51.112 [INFO][4346] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:11:51.121841 env[1554]: 2024-07-02 11:11:51.112 [INFO][4346] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:11:51.121841 env[1554]: 2024-07-02 11:11:51.118 [WARNING][4346] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" HandleID="k8s-pod-network.8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Workload="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" Jul 2 11:11:51.121841 env[1554]: 2024-07-02 11:11:51.118 [INFO][4346] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" HandleID="k8s-pod-network.8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Workload="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" Jul 2 11:11:51.121841 env[1554]: 2024-07-02 11:11:51.120 [INFO][4346] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:11:51.121841 env[1554]: 2024-07-02 11:11:51.120 [INFO][4309] k8s.go 621: Teardown processing complete. ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Jul 2 11:11:51.122376 env[1554]: time="2024-07-02T11:11:51.121973209Z" level=info msg="TearDown network for sandbox \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\" successfully" Jul 2 11:11:51.122376 env[1554]: time="2024-07-02T11:11:51.122011273Z" level=info msg="StopPodSandbox for \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\" returns successfully" Jul 2 11:11:51.122653 env[1554]: time="2024-07-02T11:11:51.122625222Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dfvxs,Uid:b09791f9-8fe4-4c17-ac3e-a51fe3faea00,Namespace:calico-system,Attempt:1,}" Jul 2 11:11:51.124937 systemd[1]: run-netns-cni\x2d91adaab8\x2de9ab\x2d7428\x2dd16e\x2d9bd6b2777e8d.mount: Deactivated successfully. Jul 2 11:11:51.130825 env[1554]: 2024-07-02 11:11:51.094 [INFO][4308] k8s.go 608: Cleaning up netns ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Jul 2 11:11:51.130825 env[1554]: 2024-07-02 11:11:51.095 [INFO][4308] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" iface="eth0" netns="/var/run/netns/cni-463ec45a-fb1b-9ad0-ad7e-09902955792e" Jul 2 11:11:51.130825 env[1554]: 2024-07-02 11:11:51.095 [INFO][4308] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" iface="eth0" netns="/var/run/netns/cni-463ec45a-fb1b-9ad0-ad7e-09902955792e" Jul 2 11:11:51.130825 env[1554]: 2024-07-02 11:11:51.095 [INFO][4308] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" iface="eth0" netns="/var/run/netns/cni-463ec45a-fb1b-9ad0-ad7e-09902955792e" Jul 2 11:11:51.130825 env[1554]: 2024-07-02 11:11:51.095 [INFO][4308] k8s.go 615: Releasing IP address(es) ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Jul 2 11:11:51.130825 env[1554]: 2024-07-02 11:11:51.095 [INFO][4308] utils.go 188: Calico CNI releasing IP address ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Jul 2 11:11:51.130825 env[1554]: 2024-07-02 11:11:51.112 [INFO][4345] ipam_plugin.go 411: Releasing address using handleID ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" HandleID="k8s-pod-network.eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" Jul 2 11:11:51.130825 env[1554]: 2024-07-02 11:11:51.112 [INFO][4345] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:11:51.130825 env[1554]: 2024-07-02 11:11:51.120 [INFO][4345] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:11:51.130825 env[1554]: 2024-07-02 11:11:51.126 [WARNING][4345] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" HandleID="k8s-pod-network.eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" Jul 2 11:11:51.130825 env[1554]: 2024-07-02 11:11:51.126 [INFO][4345] ipam_plugin.go 439: Releasing address using workloadID ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" HandleID="k8s-pod-network.eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" Jul 2 11:11:51.130825 env[1554]: 2024-07-02 11:11:51.128 [INFO][4345] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:11:51.130825 env[1554]: 2024-07-02 11:11:51.129 [INFO][4308] k8s.go 621: Teardown processing complete. ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Jul 2 11:11:51.131476 env[1554]: time="2024-07-02T11:11:51.130900644Z" level=info msg="TearDown network for sandbox \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\" successfully" Jul 2 11:11:51.131476 env[1554]: time="2024-07-02T11:11:51.130932254Z" level=info msg="StopPodSandbox for \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\" returns successfully" Jul 2 11:11:51.131591 env[1554]: time="2024-07-02T11:11:51.131522352Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-glz8r,Uid:7f11a122-d563-4cfc-ba9d-d1495c79de02,Namespace:kube-system,Attempt:1,}" Jul 2 11:11:51.134981 systemd[1]: run-netns-cni\x2d463ec45a\x2dfb1b\x2d9ad0\x2dad7e\x2d09902955792e.mount: Deactivated successfully. Jul 2 11:11:51.158473 kubelet[2596]: I0702 11:11:51.158425 2596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-nwl4c" podStartSLOduration=30.158409382 podStartE2EDuration="30.158409382s" podCreationTimestamp="2024-07-02 11:11:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 11:11:51.158078482 +0000 UTC m=+43.195757324" watchObservedRunningTime="2024-07-02 11:11:51.158409382 +0000 UTC m=+43.196088210" Jul 2 11:11:51.164000 audit[4428]: NETFILTER_CFG table=filter:100 family=2 entries=14 op=nft_register_rule pid=4428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:51.164000 audit[4428]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffd255a5ba0 a2=0 a3=7ffd255a5b8c items=0 ppid=2850 pid=4428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.164000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:51.174000 audit[4428]: NETFILTER_CFG table=nat:101 family=2 entries=14 op=nft_register_rule pid=4428 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:51.174000 audit[4428]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd255a5ba0 a2=0 a3=0 items=0 ppid=2850 pid=4428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.174000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:51.188000 audit[4459]: NETFILTER_CFG table=filter:102 family=2 entries=11 op=nft_register_rule pid=4459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:51.188000 audit[4459]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe23b1d330 a2=0 a3=7ffe23b1d31c items=0 ppid=2850 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.188000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:51.189000 audit[4459]: NETFILTER_CFG table=nat:103 family=2 entries=35 op=nft_register_chain pid=4459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:51.189000 audit[4459]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe23b1d330 a2=0 a3=7ffe23b1d31c items=0 ppid=2850 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.189000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:51.204863 systemd-networkd[1298]: calidfab5145204: Link UP Jul 2 11:11:51.260261 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 11:11:51.260333 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidfab5145204: link becomes ready Jul 2 11:11:51.259000 audit[4069]: USER_AUTH pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=112.54.220.94 addr=112.54.220.94 terminal=ssh res=failed' Jul 2 11:11:51.260578 systemd-networkd[1298]: calidfab5145204: Gained carrier Jul 2 11:11:51.260901 systemd-networkd[1298]: calid3526dd7d99: Link UP Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.156 [INFO][4377] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0 csi-node-driver- calico-system b09791f9-8fe4-4c17-ac3e-a51fe3faea00 717 0 2024-07-02 11:11:26 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:6cc9df58f4 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.5-a-18871bf0db csi-node-driver-dfvxs eth0 default [] [] [kns.calico-system ksa.calico-system.default] calidfab5145204 [] []}} ContainerID="3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" Namespace="calico-system" Pod="csi-node-driver-dfvxs" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-" Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.156 [INFO][4377] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" Namespace="calico-system" Pod="csi-node-driver-dfvxs" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.177 [INFO][4426] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" HandleID="k8s-pod-network.3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" Workload="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.183 [INFO][4426] ipam_plugin.go 264: Auto assigning IP ContainerID="3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" HandleID="k8s-pod-network.3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" Workload="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000297e90), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.5-a-18871bf0db", "pod":"csi-node-driver-dfvxs", "timestamp":"2024-07-02 11:11:51.177255439 +0000 UTC"}, Hostname:"ci-3510.3.5-a-18871bf0db", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.184 [INFO][4426] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.184 [INFO][4426] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.184 [INFO][4426] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-18871bf0db' Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.185 [INFO][4426] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.188 [INFO][4426] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.192 [INFO][4426] ipam.go 489: Trying affinity for 192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.193 [INFO][4426] ipam.go 155: Attempting to load block cidr=192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.195 [INFO][4426] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.195 [INFO][4426] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.0/26 handle="k8s-pod-network.3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.196 [INFO][4426] ipam.go 1685: Creating new handle: k8s-pod-network.3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651 Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.199 [INFO][4426] ipam.go 1203: Writing block in order to claim IPs block=192.168.17.0/26 handle="k8s-pod-network.3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.202 [INFO][4426] ipam.go 1216: Successfully claimed IPs: [192.168.17.2/26] block=192.168.17.0/26 handle="k8s-pod-network.3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.202 [INFO][4426] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.2/26] handle="k8s-pod-network.3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.202 [INFO][4426] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:11:51.266792 env[1554]: 2024-07-02 11:11:51.202 [INFO][4426] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.17.2/26] IPv6=[] ContainerID="3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" HandleID="k8s-pod-network.3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" Workload="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" Jul 2 11:11:51.267231 env[1554]: 2024-07-02 11:11:51.203 [INFO][4377] k8s.go 386: Populated endpoint ContainerID="3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" Namespace="calico-system" Pod="csi-node-driver-dfvxs" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b09791f9-8fe4-4c17-ac3e-a51fe3faea00", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 11, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"", Pod:"csi-node-driver-dfvxs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calidfab5145204", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:11:51.267231 env[1554]: 2024-07-02 11:11:51.203 [INFO][4377] k8s.go 387: Calico CNI using IPs: [192.168.17.2/32] ContainerID="3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" Namespace="calico-system" Pod="csi-node-driver-dfvxs" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" Jul 2 11:11:51.267231 env[1554]: 2024-07-02 11:11:51.203 [INFO][4377] dataplane_linux.go 68: Setting the host side veth name to calidfab5145204 ContainerID="3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" Namespace="calico-system" Pod="csi-node-driver-dfvxs" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" Jul 2 11:11:51.267231 env[1554]: 2024-07-02 11:11:51.260 [INFO][4377] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" Namespace="calico-system" Pod="csi-node-driver-dfvxs" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" Jul 2 11:11:51.267231 env[1554]: 2024-07-02 11:11:51.260 [INFO][4377] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" Namespace="calico-system" Pod="csi-node-driver-dfvxs" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b09791f9-8fe4-4c17-ac3e-a51fe3faea00", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 11, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651", Pod:"csi-node-driver-dfvxs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calidfab5145204", MAC:"96:d1:9a:8c:4f:ac", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:11:51.267231 env[1554]: 2024-07-02 11:11:51.265 [INFO][4377] k8s.go 500: Wrote updated endpoint to datastore ContainerID="3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651" Namespace="calico-system" Pod="csi-node-driver-dfvxs" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" Jul 2 11:11:51.269000 audit[4479]: NETFILTER_CFG table=filter:104 family=2 entries=38 op=nft_register_chain pid=4479 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:11:51.269000 audit[4479]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7fffb6860930 a2=0 a3=7fffb686091c items=0 ppid=3829 pid=4479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.269000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:11:51.271899 env[1554]: time="2024-07-02T11:11:51.271852502Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:11:51.271899 env[1554]: time="2024-07-02T11:11:51.271871981Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:11:51.271899 env[1554]: time="2024-07-02T11:11:51.271878623Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:11:51.271985 env[1554]: time="2024-07-02T11:11:51.271940714Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651 pid=4482 runtime=io.containerd.runc.v2 Jul 2 11:11:51.277467 systemd[1]: Started cri-containerd-3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651.scope. Jul 2 11:11:51.288769 systemd-networkd[1298]: calid3526dd7d99: Gained carrier Jul 2 11:11:51.289301 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid3526dd7d99: link becomes ready Jul 2 11:11:51.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.294000 audit: BPF prog-id=148 op=LOAD Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4482 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364386433343062646363633962393362363439613434366334663361 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4482 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364386433343062646363633962393362363439613434366334663361 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit: BPF prog-id=149 op=LOAD Jul 2 11:11:51.295000 audit[4493]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000328950 items=0 ppid=4482 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364386433343062646363633962393362363439613434366334663361 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit: BPF prog-id=150 op=LOAD Jul 2 11:11:51.295000 audit[4493]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000328998 items=0 ppid=4482 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364386433343062646363633962393362363439613434366334663361 Jul 2 11:11:51.295000 audit: BPF prog-id=150 op=UNLOAD Jul 2 11:11:51.295000 audit: BPF prog-id=149 op=UNLOAD Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { perfmon } for pid=4493 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit[4493]: AVC avc: denied { bpf } for pid=4493 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.295000 audit: BPF prog-id=151 op=LOAD Jul 2 11:11:51.295000 audit[4493]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000328da8 items=0 ppid=4482 pid=4493 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364386433343062646363633962393362363439613434366334663361 Jul 2 11:11:51.301561 env[1554]: time="2024-07-02T11:11:51.301532726Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-dfvxs,Uid:b09791f9-8fe4-4c17-ac3e-a51fe3faea00,Namespace:calico-system,Attempt:1,} returns sandbox id \"3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651\"" Jul 2 11:11:51.302239 env[1554]: time="2024-07-02T11:11:51.302224236Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.161 [INFO][4389] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0 coredns-7db6d8ff4d- kube-system 7f11a122-d563-4cfc-ba9d-d1495c79de02 716 0 2024-07-02 11:11:21 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.5-a-18871bf0db coredns-7db6d8ff4d-glz8r eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid3526dd7d99 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-glz8r" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-" Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.161 [INFO][4389] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-glz8r" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.181 [INFO][4433] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" HandleID="k8s-pod-network.8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.187 [INFO][4433] ipam_plugin.go 264: Auto assigning IP ContainerID="8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" HandleID="k8s-pod-network.8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000370df0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.5-a-18871bf0db", "pod":"coredns-7db6d8ff4d-glz8r", "timestamp":"2024-07-02 11:11:51.181329116 +0000 UTC"}, Hostname:"ci-3510.3.5-a-18871bf0db", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.187 [INFO][4433] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.202 [INFO][4433] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.202 [INFO][4433] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-18871bf0db' Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.203 [INFO][4433] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.207 [INFO][4433] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.214 [INFO][4433] ipam.go 489: Trying affinity for 192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.215 [INFO][4433] ipam.go 155: Attempting to load block cidr=192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.217 [INFO][4433] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.217 [INFO][4433] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.0/26 handle="k8s-pod-network.8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.218 [INFO][4433] ipam.go 1685: Creating new handle: k8s-pod-network.8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.221 [INFO][4433] ipam.go 1203: Writing block in order to claim IPs block=192.168.17.0/26 handle="k8s-pod-network.8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.224 [INFO][4433] ipam.go 1216: Successfully claimed IPs: [192.168.17.3/26] block=192.168.17.0/26 handle="k8s-pod-network.8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.224 [INFO][4433] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.3/26] handle="k8s-pod-network.8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.224 [INFO][4433] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:11:51.304451 env[1554]: 2024-07-02 11:11:51.224 [INFO][4433] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.17.3/26] IPv6=[] ContainerID="8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" HandleID="k8s-pod-network.8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" Jul 2 11:11:51.305123 env[1554]: 2024-07-02 11:11:51.225 [INFO][4389] k8s.go 386: Populated endpoint ContainerID="8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-glz8r" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"7f11a122-d563-4cfc-ba9d-d1495c79de02", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 11, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"", Pod:"coredns-7db6d8ff4d-glz8r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.17.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid3526dd7d99", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:11:51.305123 env[1554]: 2024-07-02 11:11:51.225 [INFO][4389] k8s.go 387: Calico CNI using IPs: [192.168.17.3/32] ContainerID="8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-glz8r" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" Jul 2 11:11:51.305123 env[1554]: 2024-07-02 11:11:51.225 [INFO][4389] dataplane_linux.go 68: Setting the host side veth name to calid3526dd7d99 ContainerID="8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-glz8r" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" Jul 2 11:11:51.305123 env[1554]: 2024-07-02 11:11:51.288 [INFO][4389] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-glz8r" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" Jul 2 11:11:51.305123 env[1554]: 2024-07-02 11:11:51.299 [INFO][4389] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-glz8r" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"7f11a122-d563-4cfc-ba9d-d1495c79de02", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 11, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e", Pod:"coredns-7db6d8ff4d-glz8r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.17.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid3526dd7d99", MAC:"ce:04:0d:f1:9f:04", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:11:51.305123 env[1554]: 2024-07-02 11:11:51.303 [INFO][4389] k8s.go 500: Wrote updated endpoint to datastore ContainerID="8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-glz8r" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" Jul 2 11:11:51.309000 audit[4533]: NETFILTER_CFG table=filter:105 family=2 entries=40 op=nft_register_chain pid=4533 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:11:51.309000 audit[4533]: SYSCALL arch=c000003e syscall=46 success=yes exit=21072 a0=3 a1=7fffa31c4ca0 a2=0 a3=7fffa31c4c8c items=0 ppid=3829 pid=4533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.309000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:11:51.310714 env[1554]: time="2024-07-02T11:11:51.310526385Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:11:51.310714 env[1554]: time="2024-07-02T11:11:51.310548983Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:11:51.310714 env[1554]: time="2024-07-02T11:11:51.310555862Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:11:51.310714 env[1554]: time="2024-07-02T11:11:51.310617972Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e pid=4534 runtime=io.containerd.runc.v2 Jul 2 11:11:51.316197 systemd[1]: Started cri-containerd-8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e.scope. Jul 2 11:11:51.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit: BPF prog-id=152 op=LOAD Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4534 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861623064636232383932323530373165383937396434663362363030 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4534 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861623064636232383932323530373165383937396434663362363030 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit: BPF prog-id=153 op=LOAD Jul 2 11:11:51.321000 audit[4545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000b7a10 items=0 ppid=4534 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861623064636232383932323530373165383937396434663362363030 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit: BPF prog-id=154 op=LOAD Jul 2 11:11:51.321000 audit[4545]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000b7a58 items=0 ppid=4534 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861623064636232383932323530373165383937396434663362363030 Jul 2 11:11:51.321000 audit: BPF prog-id=154 op=UNLOAD Jul 2 11:11:51.321000 audit: BPF prog-id=153 op=UNLOAD Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { perfmon } for pid=4545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit[4545]: AVC avc: denied { bpf } for pid=4545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.321000 audit: BPF prog-id=155 op=LOAD Jul 2 11:11:51.321000 audit[4545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000b7e68 items=0 ppid=4534 pid=4545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861623064636232383932323530373165383937396434663362363030 Jul 2 11:11:51.339149 env[1554]: time="2024-07-02T11:11:51.339122950Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-glz8r,Uid:7f11a122-d563-4cfc-ba9d-d1495c79de02,Namespace:kube-system,Attempt:1,} returns sandbox id \"8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e\"" Jul 2 11:11:51.340347 env[1554]: time="2024-07-02T11:11:51.340332565Z" level=info msg="CreateContainer within sandbox \"8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 11:11:51.344706 env[1554]: time="2024-07-02T11:11:51.344664037Z" level=info msg="CreateContainer within sandbox \"8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"2af9bc67d28d4014d0fe21eec982f2e4b2e82d9416508a32c1900285f40750ea\"" Jul 2 11:11:51.344892 env[1554]: time="2024-07-02T11:11:51.344878781Z" level=info msg="StartContainer for \"2af9bc67d28d4014d0fe21eec982f2e4b2e82d9416508a32c1900285f40750ea\"" Jul 2 11:11:51.352098 systemd[1]: Started cri-containerd-2af9bc67d28d4014d0fe21eec982f2e4b2e82d9416508a32c1900285f40750ea.scope. Jul 2 11:11:51.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit: BPF prog-id=156 op=LOAD Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4534 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261663962633637643238643430313464306665323165656339383266 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4534 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261663962633637643238643430313464306665323165656339383266 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit: BPF prog-id=157 op=LOAD Jul 2 11:11:51.357000 audit[4575]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00027bde0 items=0 ppid=4534 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261663962633637643238643430313464306665323165656339383266 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit: BPF prog-id=158 op=LOAD Jul 2 11:11:51.357000 audit[4575]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00027be28 items=0 ppid=4534 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261663962633637643238643430313464306665323165656339383266 Jul 2 11:11:51.357000 audit: BPF prog-id=158 op=UNLOAD Jul 2 11:11:51.357000 audit: BPF prog-id=157 op=UNLOAD Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { perfmon } for pid=4575 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit[4575]: AVC avc: denied { bpf } for pid=4575 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:51.357000 audit: BPF prog-id=159 op=LOAD Jul 2 11:11:51.357000 audit[4575]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00033c238 items=0 ppid=4534 pid=4575 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:51.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261663962633637643238643430313464306665323165656339383266 Jul 2 11:11:51.364340 env[1554]: time="2024-07-02T11:11:51.364317159Z" level=info msg="StartContainer for \"2af9bc67d28d4014d0fe21eec982f2e4b2e82d9416508a32c1900285f40750ea\" returns successfully" Jul 2 11:11:51.886582 systemd-networkd[1298]: cali708fb0dc2c2: Gained IPv6LL Jul 2 11:11:52.181593 kubelet[2596]: I0702 11:11:52.181386 2596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-glz8r" podStartSLOduration=31.181348314 podStartE2EDuration="31.181348314s" podCreationTimestamp="2024-07-02 11:11:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 11:11:52.180195586 +0000 UTC m=+44.217874479" watchObservedRunningTime="2024-07-02 11:11:52.181348314 +0000 UTC m=+44.219027183" Jul 2 11:11:52.198000 audit[4618]: NETFILTER_CFG table=filter:106 family=2 entries=8 op=nft_register_rule pid=4618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:52.237862 kernel: kauditd_printk_skb: 299 callbacks suppressed Jul 2 11:11:52.237942 kernel: audit: type=1325 audit(1719918712.198:1116): table=filter:106 family=2 entries=8 op=nft_register_rule pid=4618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:52.198000 audit[4618]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc46a494f0 a2=0 a3=7ffc46a494dc items=0 ppid=2850 pid=4618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:52.388143 kernel: audit: type=1300 audit(1719918712.198:1116): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc46a494f0 a2=0 a3=7ffc46a494dc items=0 ppid=2850 pid=4618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:52.388206 kernel: audit: type=1327 audit(1719918712.198:1116): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:52.198000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:52.399370 systemd-networkd[1298]: calidfab5145204: Gained IPv6LL Jul 2 11:11:52.201000 audit[4618]: NETFILTER_CFG table=nat:107 family=2 entries=44 op=nft_register_rule pid=4618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:52.201000 audit[4618]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc46a494f0 a2=0 a3=7ffc46a494dc items=0 ppid=2850 pid=4618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:52.521518 env[1554]: time="2024-07-02T11:11:52.521497354Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:52.521946 env[1554]: time="2024-07-02T11:11:52.521930819Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:52.522570 env[1554]: time="2024-07-02T11:11:52.522559415Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:52.523457 env[1554]: time="2024-07-02T11:11:52.523446318Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:52.524040 env[1554]: time="2024-07-02T11:11:52.524026005Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:1a094aeaf1521e225668c83cbf63c0ec63afbdb8c4dd7c3d2aab0ec917d103de\"" Jul 2 11:11:52.525031 env[1554]: time="2024-07-02T11:11:52.524990367Z" level=info msg="CreateContainer within sandbox \"3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 11:11:52.558826 kubelet[2596]: I0702 11:11:52.558812 2596 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 11:11:52.597744 kernel: audit: type=1325 audit(1719918712.201:1117): table=nat:107 family=2 entries=44 op=nft_register_rule pid=4618 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:52.597802 kernel: audit: type=1300 audit(1719918712.201:1117): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc46a494f0 a2=0 a3=7ffc46a494dc items=0 ppid=2850 pid=4618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:52.597816 kernel: audit: type=1327 audit(1719918712.201:1117): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:52.201000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:52.655335 env[1554]: time="2024-07-02T11:11:52.655309702Z" level=info msg="CreateContainer within sandbox \"3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f2a2c244f8043fb0628eb7c0732caf8aea0e10957911e372207b6d5d69d5dcb4\"" Jul 2 11:11:52.655637 env[1554]: time="2024-07-02T11:11:52.655624239Z" level=info msg="StartContainer for \"f2a2c244f8043fb0628eb7c0732caf8aea0e10957911e372207b6d5d69d5dcb4\"" Jul 2 11:11:52.663686 systemd[1]: Started cri-containerd-f2a2c244f8043fb0628eb7c0732caf8aea0e10957911e372207b6d5d69d5dcb4.scope. Jul 2 11:11:52.670000 audit[4644]: AVC avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.670000 audit[4644]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f30bdfbf7f8 items=0 ppid=4482 pid=4644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:52.827537 kernel: audit: type=1400 audit(1719918712.670:1118): avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.827612 kernel: audit: type=1300 audit(1719918712.670:1118): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f30bdfbf7f8 items=0 ppid=4482 pid=4644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:52.827630 kernel: audit: type=1327 audit(1719918712.670:1118): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613263323434663830343366623036323865623763303733326361 Jul 2 11:11:52.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613263323434663830343366623036323865623763303733326361 Jul 2 11:11:52.917774 kernel: audit: type=1400 audit(1719918712.670:1119): avc: denied { bpf } for pid=4644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.670000 audit[4644]: AVC avc: denied { bpf } for pid=4644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.670000 audit[4644]: AVC avc: denied { bpf } for pid=4644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.670000 audit[4644]: AVC avc: denied { bpf } for pid=4644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.670000 audit[4644]: AVC avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.670000 audit[4644]: AVC avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.670000 audit[4644]: AVC avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.670000 audit[4644]: AVC avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.670000 audit[4644]: AVC avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.670000 audit[4644]: AVC avc: denied { bpf } for pid=4644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.670000 audit[4644]: AVC avc: denied { bpf } for pid=4644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.670000 audit: BPF prog-id=160 op=LOAD Jul 2 11:11:52.670000 audit[4644]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ae2f8 items=0 ppid=4482 pid=4644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:52.670000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613263323434663830343366623036323865623763303733326361 Jul 2 11:11:52.826000 audit[4644]: AVC avc: denied { bpf } for pid=4644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.826000 audit[4644]: AVC avc: denied { bpf } for pid=4644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.826000 audit[4644]: AVC avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.826000 audit[4644]: AVC avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.826000 audit[4644]: AVC avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.826000 audit[4644]: AVC avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.826000 audit[4644]: AVC avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.826000 audit[4644]: AVC avc: denied { bpf } for pid=4644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.826000 audit[4644]: AVC avc: denied { bpf } for pid=4644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.826000 audit: BPF prog-id=161 op=LOAD Jul 2 11:11:52.826000 audit[4644]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003ae348 items=0 ppid=4482 pid=4644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:52.826000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613263323434663830343366623036323865623763303733326361 Jul 2 11:11:52.978000 audit: BPF prog-id=161 op=UNLOAD Jul 2 11:11:52.978000 audit: BPF prog-id=160 op=UNLOAD Jul 2 11:11:52.978000 audit[4644]: AVC avc: denied { bpf } for pid=4644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.978000 audit[4644]: AVC avc: denied { bpf } for pid=4644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.978000 audit[4644]: AVC avc: denied { bpf } for pid=4644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.978000 audit[4644]: AVC avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.978000 audit[4644]: AVC avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.978000 audit[4644]: AVC avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.978000 audit[4644]: AVC avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.978000 audit[4644]: AVC avc: denied { perfmon } for pid=4644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.978000 audit[4644]: AVC avc: denied { bpf } for pid=4644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.978000 audit[4644]: AVC avc: denied { bpf } for pid=4644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:52.978000 audit: BPF prog-id=162 op=LOAD Jul 2 11:11:52.978000 audit[4644]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003ae3d8 items=0 ppid=4482 pid=4644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:52.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613263323434663830343366623036323865623763303733326361 Jul 2 11:11:52.984922 env[1554]: time="2024-07-02T11:11:52.984895286Z" level=info msg="StartContainer for \"f2a2c244f8043fb0628eb7c0732caf8aea0e10957911e372207b6d5d69d5dcb4\" returns successfully" Jul 2 11:11:52.985485 env[1554]: time="2024-07-02T11:11:52.985471275Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 11:11:53.102529 systemd-networkd[1298]: calid3526dd7d99: Gained IPv6LL Jul 2 11:11:53.211000 audit[4720]: NETFILTER_CFG table=filter:108 family=2 entries=8 op=nft_register_rule pid=4720 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:53.211000 audit[4720]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffee98d4380 a2=0 a3=7ffee98d436c items=0 ppid=2850 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:53.211000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:53.226000 audit[4720]: NETFILTER_CFG table=nat:109 family=2 entries=56 op=nft_register_chain pid=4720 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:11:53.226000 audit[4720]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffee98d4380 a2=0 a3=7ffee98d436c items=0 ppid=2850 pid=4720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:53.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:11:53.353624 sshd[4069]: Failed password for root from 112.54.220.94 port 49318 ssh2 Jul 2 11:11:53.644000 audit[4069]: USER_AUTH pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=112.54.220.94 addr=112.54.220.94 terminal=ssh res=failed' Jul 2 11:11:54.027431 env[1554]: time="2024-07-02T11:11:54.027153429Z" level=info msg="StopPodSandbox for \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\"" Jul 2 11:11:54.126848 env[1554]: 2024-07-02 11:11:54.100 [INFO][4744] k8s.go 608: Cleaning up netns ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Jul 2 11:11:54.126848 env[1554]: 2024-07-02 11:11:54.100 [INFO][4744] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" iface="eth0" netns="/var/run/netns/cni-a510245c-10b8-ee14-5f2a-b4b5acf7e7aa" Jul 2 11:11:54.126848 env[1554]: 2024-07-02 11:11:54.100 [INFO][4744] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" iface="eth0" netns="/var/run/netns/cni-a510245c-10b8-ee14-5f2a-b4b5acf7e7aa" Jul 2 11:11:54.126848 env[1554]: 2024-07-02 11:11:54.100 [INFO][4744] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" iface="eth0" netns="/var/run/netns/cni-a510245c-10b8-ee14-5f2a-b4b5acf7e7aa" Jul 2 11:11:54.126848 env[1554]: 2024-07-02 11:11:54.100 [INFO][4744] k8s.go 615: Releasing IP address(es) ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Jul 2 11:11:54.126848 env[1554]: 2024-07-02 11:11:54.100 [INFO][4744] utils.go 188: Calico CNI releasing IP address ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Jul 2 11:11:54.126848 env[1554]: 2024-07-02 11:11:54.118 [INFO][4760] ipam_plugin.go 411: Releasing address using handleID ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" HandleID="k8s-pod-network.560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" Jul 2 11:11:54.126848 env[1554]: 2024-07-02 11:11:54.119 [INFO][4760] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:11:54.126848 env[1554]: 2024-07-02 11:11:54.119 [INFO][4760] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:11:54.126848 env[1554]: 2024-07-02 11:11:54.124 [WARNING][4760] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" HandleID="k8s-pod-network.560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" Jul 2 11:11:54.126848 env[1554]: 2024-07-02 11:11:54.124 [INFO][4760] ipam_plugin.go 439: Releasing address using workloadID ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" HandleID="k8s-pod-network.560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" Jul 2 11:11:54.126848 env[1554]: 2024-07-02 11:11:54.125 [INFO][4760] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:11:54.126848 env[1554]: 2024-07-02 11:11:54.126 [INFO][4744] k8s.go 621: Teardown processing complete. ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Jul 2 11:11:54.127192 env[1554]: time="2024-07-02T11:11:54.126924063Z" level=info msg="TearDown network for sandbox \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\" successfully" Jul 2 11:11:54.127192 env[1554]: time="2024-07-02T11:11:54.126948814Z" level=info msg="StopPodSandbox for \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\" returns successfully" Jul 2 11:11:54.127432 env[1554]: time="2024-07-02T11:11:54.127380276Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8c87778f6-5nk9g,Uid:3f2cbe57-39ba-405a-995f-373cd9bf3043,Namespace:calico-system,Attempt:1,}" Jul 2 11:11:54.128775 systemd[1]: run-netns-cni\x2da510245c\x2d10b8\x2dee14\x2d5f2a\x2db4b5acf7e7aa.mount: Deactivated successfully. Jul 2 11:11:54.208585 systemd-networkd[1298]: cali217e56a638c: Link UP Jul 2 11:11:54.263286 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 11:11:54.263348 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali217e56a638c: link becomes ready Jul 2 11:11:54.263464 systemd-networkd[1298]: cali217e56a638c: Gained carrier Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.171 [INFO][4777] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0 calico-kube-controllers-8c87778f6- calico-system 3f2cbe57-39ba-405a-995f-373cd9bf3043 754 0 2024-07-02 11:11:26 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:8c87778f6 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.5-a-18871bf0db calico-kube-controllers-8c87778f6-5nk9g eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali217e56a638c [] []}} ContainerID="98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" Namespace="calico-system" Pod="calico-kube-controllers-8c87778f6-5nk9g" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-" Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.171 [INFO][4777] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" Namespace="calico-system" Pod="calico-kube-controllers-8c87778f6-5nk9g" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.184 [INFO][4799] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" HandleID="k8s-pod-network.98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.190 [INFO][4799] ipam_plugin.go 264: Auto assigning IP ContainerID="98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" HandleID="k8s-pod-network.98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f9a20), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.5-a-18871bf0db", "pod":"calico-kube-controllers-8c87778f6-5nk9g", "timestamp":"2024-07-02 11:11:54.184515592 +0000 UTC"}, Hostname:"ci-3510.3.5-a-18871bf0db", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.191 [INFO][4799] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.191 [INFO][4799] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.191 [INFO][4799] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-18871bf0db' Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.192 [INFO][4799] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.194 [INFO][4799] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.197 [INFO][4799] ipam.go 489: Trying affinity for 192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.198 [INFO][4799] ipam.go 155: Attempting to load block cidr=192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.200 [INFO][4799] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.200 [INFO][4799] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.0/26 handle="k8s-pod-network.98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.201 [INFO][4799] ipam.go 1685: Creating new handle: k8s-pod-network.98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66 Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.203 [INFO][4799] ipam.go 1203: Writing block in order to claim IPs block=192.168.17.0/26 handle="k8s-pod-network.98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.206 [INFO][4799] ipam.go 1216: Successfully claimed IPs: [192.168.17.4/26] block=192.168.17.0/26 handle="k8s-pod-network.98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.206 [INFO][4799] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.4/26] handle="k8s-pod-network.98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.206 [INFO][4799] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:11:54.268834 env[1554]: 2024-07-02 11:11:54.206 [INFO][4799] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.17.4/26] IPv6=[] ContainerID="98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" HandleID="k8s-pod-network.98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" Jul 2 11:11:54.269469 env[1554]: 2024-07-02 11:11:54.207 [INFO][4777] k8s.go 386: Populated endpoint ContainerID="98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" Namespace="calico-system" Pod="calico-kube-controllers-8c87778f6-5nk9g" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0", GenerateName:"calico-kube-controllers-8c87778f6-", Namespace:"calico-system", SelfLink:"", UID:"3f2cbe57-39ba-405a-995f-373cd9bf3043", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 11, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8c87778f6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"", Pod:"calico-kube-controllers-8c87778f6-5nk9g", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.17.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali217e56a638c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:11:54.269469 env[1554]: 2024-07-02 11:11:54.207 [INFO][4777] k8s.go 387: Calico CNI using IPs: [192.168.17.4/32] ContainerID="98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" Namespace="calico-system" Pod="calico-kube-controllers-8c87778f6-5nk9g" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" Jul 2 11:11:54.269469 env[1554]: 2024-07-02 11:11:54.207 [INFO][4777] dataplane_linux.go 68: Setting the host side veth name to cali217e56a638c ContainerID="98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" Namespace="calico-system" Pod="calico-kube-controllers-8c87778f6-5nk9g" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" Jul 2 11:11:54.269469 env[1554]: 2024-07-02 11:11:54.263 [INFO][4777] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" Namespace="calico-system" Pod="calico-kube-controllers-8c87778f6-5nk9g" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" Jul 2 11:11:54.269469 env[1554]: 2024-07-02 11:11:54.263 [INFO][4777] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" Namespace="calico-system" Pod="calico-kube-controllers-8c87778f6-5nk9g" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0", GenerateName:"calico-kube-controllers-8c87778f6-", Namespace:"calico-system", SelfLink:"", UID:"3f2cbe57-39ba-405a-995f-373cd9bf3043", ResourceVersion:"754", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 11, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8c87778f6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66", Pod:"calico-kube-controllers-8c87778f6-5nk9g", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.17.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali217e56a638c", MAC:"e2:26:f5:48:eb:d0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:11:54.269469 env[1554]: 2024-07-02 11:11:54.268 [INFO][4777] k8s.go 500: Wrote updated endpoint to datastore ContainerID="98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66" Namespace="calico-system" Pod="calico-kube-controllers-8c87778f6-5nk9g" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" Jul 2 11:11:54.274855 env[1554]: time="2024-07-02T11:11:54.274814408Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:11:54.274855 env[1554]: time="2024-07-02T11:11:54.274842593Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:11:54.274855 env[1554]: time="2024-07-02T11:11:54.274850468Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:11:54.275009 env[1554]: time="2024-07-02T11:11:54.274935474Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66 pid=4838 runtime=io.containerd.runc.v2 Jul 2 11:11:54.273000 audit[4837]: NETFILTER_CFG table=filter:110 family=2 entries=38 op=nft_register_chain pid=4837 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:11:54.273000 audit[4837]: SYSCALL arch=c000003e syscall=46 success=yes exit=19812 a0=3 a1=7ffc274c5d60 a2=0 a3=7ffc274c5d4c items=0 ppid=3829 pid=4837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:54.273000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:11:54.282038 systemd[1]: Started cri-containerd-98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66.scope. Jul 2 11:11:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit: BPF prog-id=163 op=LOAD Jul 2 11:11:54.285000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[4848]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4838 pid=4848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:54.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938393431623231393438626336623937643763666164306661616534 Jul 2 11:11:54.285000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[4848]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4838 pid=4848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:54.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938393431623231393438626336623937643763666164306661616534 Jul 2 11:11:54.285000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.285000 audit: BPF prog-id=164 op=LOAD Jul 2 11:11:54.285000 audit[4848]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002ea720 items=0 ppid=4838 pid=4848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:54.285000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938393431623231393438626336623937643763666164306661616534 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit: BPF prog-id=165 op=LOAD Jul 2 11:11:54.286000 audit[4848]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002ea768 items=0 ppid=4838 pid=4848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:54.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938393431623231393438626336623937643763666164306661616534 Jul 2 11:11:54.286000 audit: BPF prog-id=165 op=UNLOAD Jul 2 11:11:54.286000 audit: BPF prog-id=164 op=UNLOAD Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { perfmon } for pid=4848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit[4848]: AVC avc: denied { bpf } for pid=4848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.286000 audit: BPF prog-id=166 op=LOAD Jul 2 11:11:54.286000 audit[4848]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002eab78 items=0 ppid=4838 pid=4848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:54.286000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3938393431623231393438626336623937643763666164306661616534 Jul 2 11:11:54.295516 env[1554]: time="2024-07-02T11:11:54.295496291Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:54.296085 env[1554]: time="2024-07-02T11:11:54.296070979Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:54.296725 env[1554]: time="2024-07-02T11:11:54.296713575Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:54.297578 env[1554]: time="2024-07-02T11:11:54.297565893Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:54.297966 env[1554]: time="2024-07-02T11:11:54.297946547Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:0f80feca743f4a84ddda4057266092db9134f9af9e20e12ea6fcfe51d7e3a020\"" Jul 2 11:11:54.299214 env[1554]: time="2024-07-02T11:11:54.299198139Z" level=info msg="CreateContainer within sandbox \"3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 11:11:54.303588 env[1554]: time="2024-07-02T11:11:54.303563136Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8c87778f6-5nk9g,Uid:3f2cbe57-39ba-405a-995f-373cd9bf3043,Namespace:calico-system,Attempt:1,} returns sandbox id \"98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66\"" Jul 2 11:11:54.304027 env[1554]: time="2024-07-02T11:11:54.304011925Z" level=info msg="CreateContainer within sandbox \"3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"c2bb953bd627ea25354ae1e04124d0e637df2b5e6f2704a4e4e0534421974227\"" Jul 2 11:11:54.304203 env[1554]: time="2024-07-02T11:11:54.304189493Z" level=info msg="StartContainer for \"c2bb953bd627ea25354ae1e04124d0e637df2b5e6f2704a4e4e0534421974227\"" Jul 2 11:11:54.304297 env[1554]: time="2024-07-02T11:11:54.304286403Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\"" Jul 2 11:11:54.312095 systemd[1]: Started cri-containerd-c2bb953bd627ea25354ae1e04124d0e637df2b5e6f2704a4e4e0534421974227.scope. Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f2254f0f078 items=0 ppid=4482 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:54.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332626239353362643632376561323533353461653165303431323464 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit: BPF prog-id=167 op=LOAD Jul 2 11:11:54.318000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002ddc88 items=0 ppid=4482 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:54.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332626239353362643632376561323533353461653165303431323464 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit: BPF prog-id=168 op=LOAD Jul 2 11:11:54.318000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002ddcd8 items=0 ppid=4482 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:54.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332626239353362643632376561323533353461653165303431323464 Jul 2 11:11:54.318000 audit: BPF prog-id=168 op=UNLOAD Jul 2 11:11:54.318000 audit: BPF prog-id=167 op=UNLOAD Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { perfmon } for pid=4878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit[4878]: AVC avc: denied { bpf } for pid=4878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:54.318000 audit: BPF prog-id=169 op=LOAD Jul 2 11:11:54.318000 audit[4878]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002ddd68 items=0 ppid=4482 pid=4878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:54.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332626239353362643632376561323533353461653165303431323464 Jul 2 11:11:54.325369 env[1554]: time="2024-07-02T11:11:54.325346184Z" level=info msg="StartContainer for \"c2bb953bd627ea25354ae1e04124d0e637df2b5e6f2704a4e4e0534421974227\" returns successfully" Jul 2 11:11:55.080477 kubelet[2596]: I0702 11:11:55.080394 2596 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 11:11:55.080477 kubelet[2596]: I0702 11:11:55.080470 2596 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 11:11:55.203946 kubelet[2596]: I0702 11:11:55.203792 2596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-dfvxs" podStartSLOduration=26.207377337 podStartE2EDuration="29.203755656s" podCreationTimestamp="2024-07-02 11:11:26 +0000 UTC" firstStartedPulling="2024-07-02 11:11:51.302112217 +0000 UTC m=+43.339791041" lastFinishedPulling="2024-07-02 11:11:54.298490533 +0000 UTC m=+46.336169360" observedRunningTime="2024-07-02 11:11:55.203137279 +0000 UTC m=+47.240816182" watchObservedRunningTime="2024-07-02 11:11:55.203755656 +0000 UTC m=+47.241434533" Jul 2 11:11:55.342584 systemd-networkd[1298]: cali217e56a638c: Gained IPv6LL Jul 2 11:11:56.014393 sshd[4069]: Failed password for root from 112.54.220.94 port 49318 ssh2 Jul 2 11:11:56.624140 env[1554]: time="2024-07-02T11:11:56.624112939Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:56.624704 env[1554]: time="2024-07-02T11:11:56.624688800Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:56.625409 env[1554]: time="2024-07-02T11:11:56.625363467Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:56.625993 env[1554]: time="2024-07-02T11:11:56.625930142Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c35e88abef622483409fff52313bf764a75095197be4c5a7c7830da342654de1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:11:56.626552 env[1554]: time="2024-07-02T11:11:56.626503177Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\" returns image reference \"sha256:428d92b02253980b402b9fb18f4cb58be36dc6bcf4893e07462732cb926ea783\"" Jul 2 11:11:56.630468 env[1554]: time="2024-07-02T11:11:56.630448201Z" level=info msg="CreateContainer within sandbox \"98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 2 11:11:56.635049 env[1554]: time="2024-07-02T11:11:56.635029718Z" level=info msg="CreateContainer within sandbox \"98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"2dcca5a3e777853fdc2413d99deb3f8d22a08e5a3eef8650d02ef39532e517f4\"" Jul 2 11:11:56.635304 env[1554]: time="2024-07-02T11:11:56.635290768Z" level=info msg="StartContainer for \"2dcca5a3e777853fdc2413d99deb3f8d22a08e5a3eef8650d02ef39532e517f4\"" Jul 2 11:11:56.645277 systemd[1]: Started cri-containerd-2dcca5a3e777853fdc2413d99deb3f8d22a08e5a3eef8650d02ef39532e517f4.scope. Jul 2 11:11:56.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.649000 audit: BPF prog-id=170 op=LOAD Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4838 pid=4919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:56.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264636361356133653737373835336664633234313364393964656233 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4838 pid=4919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:56.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264636361356133653737373835336664633234313364393964656233 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit: BPF prog-id=171 op=LOAD Jul 2 11:11:56.650000 audit[4919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003cc0d0 items=0 ppid=4838 pid=4919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:56.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264636361356133653737373835336664633234313364393964656233 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit: BPF prog-id=172 op=LOAD Jul 2 11:11:56.650000 audit[4919]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003cc118 items=0 ppid=4838 pid=4919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:56.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264636361356133653737373835336664633234313364393964656233 Jul 2 11:11:56.650000 audit: BPF prog-id=172 op=UNLOAD Jul 2 11:11:56.650000 audit: BPF prog-id=171 op=UNLOAD Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { perfmon } for pid=4919 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit[4919]: AVC avc: denied { bpf } for pid=4919 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:11:56.650000 audit: BPF prog-id=173 op=LOAD Jul 2 11:11:56.650000 audit[4919]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003cc528 items=0 ppid=4838 pid=4919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:11:56.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264636361356133653737373835336664633234313364393964656233 Jul 2 11:11:56.668168 env[1554]: time="2024-07-02T11:11:56.668142384Z" level=info msg="StartContainer for \"2dcca5a3e777853fdc2413d99deb3f8d22a08e5a3eef8650d02ef39532e517f4\" returns successfully" Jul 2 11:11:57.209314 kubelet[2596]: I0702 11:11:57.209177 2596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-8c87778f6-5nk9g" podStartSLOduration=28.886469471 podStartE2EDuration="31.209135497s" podCreationTimestamp="2024-07-02 11:11:26 +0000 UTC" firstStartedPulling="2024-07-02 11:11:54.304157378 +0000 UTC m=+46.341836204" lastFinishedPulling="2024-07-02 11:11:56.626823404 +0000 UTC m=+48.664502230" observedRunningTime="2024-07-02 11:11:57.20778156 +0000 UTC m=+49.245460486" watchObservedRunningTime="2024-07-02 11:11:57.209135497 +0000 UTC m=+49.246814372" Jul 2 11:11:58.191514 kubelet[2596]: I0702 11:11:58.191451 2596 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 11:11:58.268000 audit[4069]: ANOM_LOGIN_FAILURES pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jul 2 11:11:58.270008 sshd[4069]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Jul 2 11:11:58.311855 kernel: kauditd_printk_skb: 206 callbacks suppressed Jul 2 11:11:58.311969 kernel: audit: type=2100 audit(1719918718.268:1170): pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Jul 2 11:11:58.268000 audit[4069]: USER_AUTH pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=112.54.220.94 addr=112.54.220.94 terminal=ssh res=failed' Jul 2 11:11:58.458532 kernel: audit: type=1100 audit(1719918718.268:1171): pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=112.54.220.94 addr=112.54.220.94 terminal=ssh res=failed' Jul 2 11:12:00.323477 sshd[4069]: Failed password for root from 112.54.220.94 port 49318 ssh2 Jul 2 11:12:00.677000 audit[4069]: USER_AUTH pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=112.54.220.94 addr=112.54.220.94 terminal=ssh res=failed' Jul 2 11:12:00.770415 kernel: audit: type=1100 audit(1719918720.677:1172): pid=4069 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=112.54.220.94 addr=112.54.220.94 terminal=ssh res=failed' Jul 2 11:12:02.338452 sshd[4069]: Failed password for root from 112.54.220.94 port 49318 ssh2 Jul 2 11:12:02.893586 sshd[4069]: maximum authentication attempts exceeded for root from 112.54.220.94 port 49318 ssh2 [preauth] Jul 2 11:12:02.893586 sshd[4069]: Disconnecting authenticating user root 112.54.220.94 port 49318: Too many authentication failures [preauth] Jul 2 11:12:02.894306 sshd[4069]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.54.220.94 user=root Jul 2 11:12:02.894323 sshd[4069]: PAM service(sshd) ignoring max retries; 6 > 3 Jul 2 11:12:02.896411 systemd[1]: sshd@7-147.75.203.5:22-112.54.220.94:49318.service: Deactivated successfully. Jul 2 11:12:02.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.203.5:22-112.54.220.94:49318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:12:02.985345 kernel: audit: type=1131 audit(1719918722.896:1173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-147.75.203.5:22-112.54.220.94:49318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:12:03.308876 systemd[1]: Started sshd@8-147.75.203.5:22-112.54.220.94:54836.service. Jul 2 11:12:03.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.203.5:22-112.54.220.94:54836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:12:03.399474 kernel: audit: type=1130 audit(1719918723.309:1174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.203.5:22-112.54.220.94:54836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:12:04.082000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:12:04.081000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:12:04.268352 kernel: audit: type=1400 audit(1719918724.082:1175): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:12:04.268393 kernel: audit: type=1400 audit(1719918724.081:1176): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:12:04.268414 kernel: audit: type=1400 audit(1719918724.082:1177): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:12:04.082000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:12:04.357833 kernel: audit: type=1300 audit(1719918724.082:1175): arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0059ac460 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:12:04.082000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0059ac460 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:12:04.455749 kernel: audit: type=1300 audit(1719918724.081:1176): arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c010e60060 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:12:04.081000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c010e60060 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:12:04.553735 kernel: audit: type=1300 audit(1719918724.082:1177): arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00f27a2c0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:12:04.082000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00f27a2c0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:12:04.651813 kernel: audit: type=1327 audit(1719918724.081:1176): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:12:04.081000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:12:04.744663 kernel: audit: type=1327 audit(1719918724.082:1175): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:12:04.082000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:12:04.837496 kernel: audit: type=1327 audit(1719918724.082:1177): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:12:04.082000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:12:04.082000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:12:04.082000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c010e60090 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:12:04.082000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:12:04.082000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:12:04.082000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c0109ff5f0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:12:04.082000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:12:04.082000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:12:04.082000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c0110afb60 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:12:04.082000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:12:04.170000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:12:04.170000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:12:04.170000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022e5fa0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:12:04.170000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d9f650 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:12:04.170000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:12:04.170000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:12:06.667306 kubelet[2596]: I0702 11:12:06.667068 2596 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 11:12:07.323000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:12:07.323000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000e4c060 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:12:07.323000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:12:07.323000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:12:07.323000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00213c480 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:12:07.323000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:12:07.324000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:12:07.324000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009e1ee0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:12:07.324000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:12:07.324000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:12:07.324000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009e1f00 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:12:07.324000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:12:08.019341 env[1554]: time="2024-07-02T11:12:08.019304143Z" level=info msg="StopPodSandbox for \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\"" Jul 2 11:12:08.057788 env[1554]: 2024-07-02 11:12:08.038 [WARNING][5034] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"7f11a122-d563-4cfc-ba9d-d1495c79de02", ResourceVersion:"748", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 11, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e", Pod:"coredns-7db6d8ff4d-glz8r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.17.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid3526dd7d99", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:12:08.057788 env[1554]: 2024-07-02 11:12:08.038 [INFO][5034] k8s.go 608: Cleaning up netns ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Jul 2 11:12:08.057788 env[1554]: 2024-07-02 11:12:08.038 [INFO][5034] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" iface="eth0" netns="" Jul 2 11:12:08.057788 env[1554]: 2024-07-02 11:12:08.038 [INFO][5034] k8s.go 615: Releasing IP address(es) ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Jul 2 11:12:08.057788 env[1554]: 2024-07-02 11:12:08.038 [INFO][5034] utils.go 188: Calico CNI releasing IP address ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Jul 2 11:12:08.057788 env[1554]: 2024-07-02 11:12:08.050 [INFO][5053] ipam_plugin.go 411: Releasing address using handleID ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" HandleID="k8s-pod-network.eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" Jul 2 11:12:08.057788 env[1554]: 2024-07-02 11:12:08.050 [INFO][5053] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:12:08.057788 env[1554]: 2024-07-02 11:12:08.050 [INFO][5053] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:12:08.057788 env[1554]: 2024-07-02 11:12:08.054 [WARNING][5053] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" HandleID="k8s-pod-network.eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" Jul 2 11:12:08.057788 env[1554]: 2024-07-02 11:12:08.054 [INFO][5053] ipam_plugin.go 439: Releasing address using workloadID ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" HandleID="k8s-pod-network.eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" Jul 2 11:12:08.057788 env[1554]: 2024-07-02 11:12:08.056 [INFO][5053] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:12:08.057788 env[1554]: 2024-07-02 11:12:08.057 [INFO][5034] k8s.go 621: Teardown processing complete. ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Jul 2 11:12:08.058232 env[1554]: time="2024-07-02T11:12:08.057803755Z" level=info msg="TearDown network for sandbox \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\" successfully" Jul 2 11:12:08.058232 env[1554]: time="2024-07-02T11:12:08.057821764Z" level=info msg="StopPodSandbox for \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\" returns successfully" Jul 2 11:12:08.058232 env[1554]: time="2024-07-02T11:12:08.058040316Z" level=info msg="RemovePodSandbox for \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\"" Jul 2 11:12:08.058232 env[1554]: time="2024-07-02T11:12:08.058058551Z" level=info msg="Forcibly stopping sandbox \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\"" Jul 2 11:12:08.098684 env[1554]: 2024-07-02 11:12:08.078 [WARNING][5085] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"7f11a122-d563-4cfc-ba9d-d1495c79de02", ResourceVersion:"748", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 11, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"8ab0dcb289225071e8979d4f3b60054c3bb2afade557eb4202be556dee12cd0e", Pod:"coredns-7db6d8ff4d-glz8r", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.17.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid3526dd7d99", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:12:08.098684 env[1554]: 2024-07-02 11:12:08.078 [INFO][5085] k8s.go 608: Cleaning up netns ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Jul 2 11:12:08.098684 env[1554]: 2024-07-02 11:12:08.078 [INFO][5085] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" iface="eth0" netns="" Jul 2 11:12:08.098684 env[1554]: 2024-07-02 11:12:08.078 [INFO][5085] k8s.go 615: Releasing IP address(es) ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Jul 2 11:12:08.098684 env[1554]: 2024-07-02 11:12:08.078 [INFO][5085] utils.go 188: Calico CNI releasing IP address ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Jul 2 11:12:08.098684 env[1554]: 2024-07-02 11:12:08.090 [INFO][5100] ipam_plugin.go 411: Releasing address using handleID ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" HandleID="k8s-pod-network.eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" Jul 2 11:12:08.098684 env[1554]: 2024-07-02 11:12:08.090 [INFO][5100] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:12:08.098684 env[1554]: 2024-07-02 11:12:08.090 [INFO][5100] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:12:08.098684 env[1554]: 2024-07-02 11:12:08.095 [WARNING][5100] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" HandleID="k8s-pod-network.eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" Jul 2 11:12:08.098684 env[1554]: 2024-07-02 11:12:08.095 [INFO][5100] ipam_plugin.go 439: Releasing address using workloadID ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" HandleID="k8s-pod-network.eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--glz8r-eth0" Jul 2 11:12:08.098684 env[1554]: 2024-07-02 11:12:08.097 [INFO][5100] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:12:08.098684 env[1554]: 2024-07-02 11:12:08.097 [INFO][5085] k8s.go 621: Teardown processing complete. ContainerID="eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822" Jul 2 11:12:08.098684 env[1554]: time="2024-07-02T11:12:08.098674053Z" level=info msg="TearDown network for sandbox \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\" successfully" Jul 2 11:12:08.100492 env[1554]: time="2024-07-02T11:12:08.100442107Z" level=info msg="RemovePodSandbox \"eee6b21ad50814c76d9e19b2557e708154333a5d7ed2548f95945b6eae4e2822\" returns successfully" Jul 2 11:12:08.100828 env[1554]: time="2024-07-02T11:12:08.100807202Z" level=info msg="StopPodSandbox for \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\"" Jul 2 11:12:08.159697 env[1554]: 2024-07-02 11:12:08.130 [WARNING][5132] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b09791f9-8fe4-4c17-ac3e-a51fe3faea00", ResourceVersion:"767", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 11, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651", Pod:"csi-node-driver-dfvxs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calidfab5145204", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:12:08.159697 env[1554]: 2024-07-02 11:12:08.131 [INFO][5132] k8s.go 608: Cleaning up netns ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Jul 2 11:12:08.159697 env[1554]: 2024-07-02 11:12:08.131 [INFO][5132] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" iface="eth0" netns="" Jul 2 11:12:08.159697 env[1554]: 2024-07-02 11:12:08.131 [INFO][5132] k8s.go 615: Releasing IP address(es) ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Jul 2 11:12:08.159697 env[1554]: 2024-07-02 11:12:08.131 [INFO][5132] utils.go 188: Calico CNI releasing IP address ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Jul 2 11:12:08.159697 env[1554]: 2024-07-02 11:12:08.149 [INFO][5149] ipam_plugin.go 411: Releasing address using handleID ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" HandleID="k8s-pod-network.8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Workload="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" Jul 2 11:12:08.159697 env[1554]: 2024-07-02 11:12:08.149 [INFO][5149] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:12:08.159697 env[1554]: 2024-07-02 11:12:08.149 [INFO][5149] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:12:08.159697 env[1554]: 2024-07-02 11:12:08.155 [WARNING][5149] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" HandleID="k8s-pod-network.8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Workload="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" Jul 2 11:12:08.159697 env[1554]: 2024-07-02 11:12:08.155 [INFO][5149] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" HandleID="k8s-pod-network.8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Workload="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" Jul 2 11:12:08.159697 env[1554]: 2024-07-02 11:12:08.157 [INFO][5149] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:12:08.159697 env[1554]: 2024-07-02 11:12:08.158 [INFO][5132] k8s.go 621: Teardown processing complete. ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Jul 2 11:12:08.160493 env[1554]: time="2024-07-02T11:12:08.159721136Z" level=info msg="TearDown network for sandbox \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\" successfully" Jul 2 11:12:08.160493 env[1554]: time="2024-07-02T11:12:08.159758196Z" level=info msg="StopPodSandbox for \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\" returns successfully" Jul 2 11:12:08.160493 env[1554]: time="2024-07-02T11:12:08.160205483Z" level=info msg="RemovePodSandbox for \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\"" Jul 2 11:12:08.160493 env[1554]: time="2024-07-02T11:12:08.160246012Z" level=info msg="Forcibly stopping sandbox \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\"" Jul 2 11:12:08.242131 env[1554]: 2024-07-02 11:12:08.201 [WARNING][5180] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b09791f9-8fe4-4c17-ac3e-a51fe3faea00", ResourceVersion:"767", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 11, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"6cc9df58f4", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"3d8d340bdccc9b93b649a446c4f3a266f99d9d259dc3bac22478528f4d776651", Pod:"csi-node-driver-dfvxs", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.17.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calidfab5145204", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:12:08.242131 env[1554]: 2024-07-02 11:12:08.201 [INFO][5180] k8s.go 608: Cleaning up netns ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Jul 2 11:12:08.242131 env[1554]: 2024-07-02 11:12:08.201 [INFO][5180] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" iface="eth0" netns="" Jul 2 11:12:08.242131 env[1554]: 2024-07-02 11:12:08.201 [INFO][5180] k8s.go 615: Releasing IP address(es) ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Jul 2 11:12:08.242131 env[1554]: 2024-07-02 11:12:08.201 [INFO][5180] utils.go 188: Calico CNI releasing IP address ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Jul 2 11:12:08.242131 env[1554]: 2024-07-02 11:12:08.228 [INFO][5198] ipam_plugin.go 411: Releasing address using handleID ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" HandleID="k8s-pod-network.8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Workload="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" Jul 2 11:12:08.242131 env[1554]: 2024-07-02 11:12:08.229 [INFO][5198] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:12:08.242131 env[1554]: 2024-07-02 11:12:08.229 [INFO][5198] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:12:08.242131 env[1554]: 2024-07-02 11:12:08.237 [WARNING][5198] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" HandleID="k8s-pod-network.8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Workload="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" Jul 2 11:12:08.242131 env[1554]: 2024-07-02 11:12:08.237 [INFO][5198] ipam_plugin.go 439: Releasing address using workloadID ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" HandleID="k8s-pod-network.8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Workload="ci--3510.3.5--a--18871bf0db-k8s-csi--node--driver--dfvxs-eth0" Jul 2 11:12:08.242131 env[1554]: 2024-07-02 11:12:08.239 [INFO][5198] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:12:08.242131 env[1554]: 2024-07-02 11:12:08.240 [INFO][5180] k8s.go 621: Teardown processing complete. ContainerID="8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d" Jul 2 11:12:08.242934 env[1554]: time="2024-07-02T11:12:08.242170065Z" level=info msg="TearDown network for sandbox \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\" successfully" Jul 2 11:12:08.244836 env[1554]: time="2024-07-02T11:12:08.244772567Z" level=info msg="RemovePodSandbox \"8f3c5ecf082836e7daf601ca3d9e446540213f7a537bec208dab428411cd730d\" returns successfully" Jul 2 11:12:08.245303 env[1554]: time="2024-07-02T11:12:08.245222598Z" level=info msg="StopPodSandbox for \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\"" Jul 2 11:12:08.315470 env[1554]: 2024-07-02 11:12:08.284 [WARNING][5230] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"f19dcd14-bc5e-4b10-bf51-921794a62686", ResourceVersion:"721", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 11, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774", Pod:"coredns-7db6d8ff4d-nwl4c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.17.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali708fb0dc2c2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:12:08.315470 env[1554]: 2024-07-02 11:12:08.285 [INFO][5230] k8s.go 608: Cleaning up netns ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Jul 2 11:12:08.315470 env[1554]: 2024-07-02 11:12:08.285 [INFO][5230] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" iface="eth0" netns="" Jul 2 11:12:08.315470 env[1554]: 2024-07-02 11:12:08.285 [INFO][5230] k8s.go 615: Releasing IP address(es) ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Jul 2 11:12:08.315470 env[1554]: 2024-07-02 11:12:08.285 [INFO][5230] utils.go 188: Calico CNI releasing IP address ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Jul 2 11:12:08.315470 env[1554]: 2024-07-02 11:12:08.304 [INFO][5248] ipam_plugin.go 411: Releasing address using handleID ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" HandleID="k8s-pod-network.0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" Jul 2 11:12:08.315470 env[1554]: 2024-07-02 11:12:08.304 [INFO][5248] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:12:08.315470 env[1554]: 2024-07-02 11:12:08.304 [INFO][5248] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:12:08.315470 env[1554]: 2024-07-02 11:12:08.311 [WARNING][5248] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" HandleID="k8s-pod-network.0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" Jul 2 11:12:08.315470 env[1554]: 2024-07-02 11:12:08.311 [INFO][5248] ipam_plugin.go 439: Releasing address using workloadID ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" HandleID="k8s-pod-network.0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" Jul 2 11:12:08.315470 env[1554]: 2024-07-02 11:12:08.313 [INFO][5248] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:12:08.315470 env[1554]: 2024-07-02 11:12:08.314 [INFO][5230] k8s.go 621: Teardown processing complete. ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Jul 2 11:12:08.315470 env[1554]: time="2024-07-02T11:12:08.315407761Z" level=info msg="TearDown network for sandbox \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\" successfully" Jul 2 11:12:08.315470 env[1554]: time="2024-07-02T11:12:08.315438456Z" level=info msg="StopPodSandbox for \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\" returns successfully" Jul 2 11:12:08.316209 env[1554]: time="2024-07-02T11:12:08.315821391Z" level=info msg="RemovePodSandbox for \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\"" Jul 2 11:12:08.316209 env[1554]: time="2024-07-02T11:12:08.315856219Z" level=info msg="Forcibly stopping sandbox \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\"" Jul 2 11:12:08.381509 env[1554]: 2024-07-02 11:12:08.350 [WARNING][5280] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"f19dcd14-bc5e-4b10-bf51-921794a62686", ResourceVersion:"721", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 11, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"9bf3ee69f560bf62c1786022512dea55f2a5d16373d261b2f27fe183f9021774", Pod:"coredns-7db6d8ff4d-nwl4c", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.17.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali708fb0dc2c2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:12:08.381509 env[1554]: 2024-07-02 11:12:08.350 [INFO][5280] k8s.go 608: Cleaning up netns ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Jul 2 11:12:08.381509 env[1554]: 2024-07-02 11:12:08.350 [INFO][5280] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" iface="eth0" netns="" Jul 2 11:12:08.381509 env[1554]: 2024-07-02 11:12:08.350 [INFO][5280] k8s.go 615: Releasing IP address(es) ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Jul 2 11:12:08.381509 env[1554]: 2024-07-02 11:12:08.350 [INFO][5280] utils.go 188: Calico CNI releasing IP address ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Jul 2 11:12:08.381509 env[1554]: 2024-07-02 11:12:08.370 [INFO][5298] ipam_plugin.go 411: Releasing address using handleID ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" HandleID="k8s-pod-network.0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" Jul 2 11:12:08.381509 env[1554]: 2024-07-02 11:12:08.370 [INFO][5298] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:12:08.381509 env[1554]: 2024-07-02 11:12:08.370 [INFO][5298] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:12:08.381509 env[1554]: 2024-07-02 11:12:08.377 [WARNING][5298] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" HandleID="k8s-pod-network.0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" Jul 2 11:12:08.381509 env[1554]: 2024-07-02 11:12:08.377 [INFO][5298] ipam_plugin.go 439: Releasing address using workloadID ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" HandleID="k8s-pod-network.0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Workload="ci--3510.3.5--a--18871bf0db-k8s-coredns--7db6d8ff4d--nwl4c-eth0" Jul 2 11:12:08.381509 env[1554]: 2024-07-02 11:12:08.379 [INFO][5298] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:12:08.381509 env[1554]: 2024-07-02 11:12:08.380 [INFO][5280] k8s.go 621: Teardown processing complete. ContainerID="0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab" Jul 2 11:12:08.382151 env[1554]: time="2024-07-02T11:12:08.381503282Z" level=info msg="TearDown network for sandbox \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\" successfully" Jul 2 11:12:08.383880 env[1554]: time="2024-07-02T11:12:08.383822487Z" level=info msg="RemovePodSandbox \"0621b38e8d6790f2ff7c990653d52424b8623203c32692be1d73588f96a519ab\" returns successfully" Jul 2 11:12:08.384305 env[1554]: time="2024-07-02T11:12:08.384259817Z" level=info msg="StopPodSandbox for \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\"" Jul 2 11:12:08.449957 env[1554]: 2024-07-02 11:12:08.419 [WARNING][5328] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0", GenerateName:"calico-kube-controllers-8c87778f6-", Namespace:"calico-system", SelfLink:"", UID:"3f2cbe57-39ba-405a-995f-373cd9bf3043", ResourceVersion:"805", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 11, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8c87778f6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66", Pod:"calico-kube-controllers-8c87778f6-5nk9g", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.17.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali217e56a638c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:12:08.449957 env[1554]: 2024-07-02 11:12:08.419 [INFO][5328] k8s.go 608: Cleaning up netns ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Jul 2 11:12:08.449957 env[1554]: 2024-07-02 11:12:08.419 [INFO][5328] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" iface="eth0" netns="" Jul 2 11:12:08.449957 env[1554]: 2024-07-02 11:12:08.419 [INFO][5328] k8s.go 615: Releasing IP address(es) ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Jul 2 11:12:08.449957 env[1554]: 2024-07-02 11:12:08.419 [INFO][5328] utils.go 188: Calico CNI releasing IP address ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Jul 2 11:12:08.449957 env[1554]: 2024-07-02 11:12:08.439 [INFO][5345] ipam_plugin.go 411: Releasing address using handleID ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" HandleID="k8s-pod-network.560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" Jul 2 11:12:08.449957 env[1554]: 2024-07-02 11:12:08.439 [INFO][5345] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:12:08.449957 env[1554]: 2024-07-02 11:12:08.439 [INFO][5345] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:12:08.449957 env[1554]: 2024-07-02 11:12:08.445 [WARNING][5345] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" HandleID="k8s-pod-network.560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" Jul 2 11:12:08.449957 env[1554]: 2024-07-02 11:12:08.445 [INFO][5345] ipam_plugin.go 439: Releasing address using workloadID ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" HandleID="k8s-pod-network.560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" Jul 2 11:12:08.449957 env[1554]: 2024-07-02 11:12:08.447 [INFO][5345] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:12:08.449957 env[1554]: 2024-07-02 11:12:08.448 [INFO][5328] k8s.go 621: Teardown processing complete. ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Jul 2 11:12:08.450659 env[1554]: time="2024-07-02T11:12:08.449979011Z" level=info msg="TearDown network for sandbox \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\" successfully" Jul 2 11:12:08.450659 env[1554]: time="2024-07-02T11:12:08.450022339Z" level=info msg="StopPodSandbox for \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\" returns successfully" Jul 2 11:12:08.450659 env[1554]: time="2024-07-02T11:12:08.450458006Z" level=info msg="RemovePodSandbox for \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\"" Jul 2 11:12:08.450659 env[1554]: time="2024-07-02T11:12:08.450493064Z" level=info msg="Forcibly stopping sandbox \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\"" Jul 2 11:12:08.515365 env[1554]: 2024-07-02 11:12:08.484 [WARNING][5377] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0", GenerateName:"calico-kube-controllers-8c87778f6-", Namespace:"calico-system", SelfLink:"", UID:"3f2cbe57-39ba-405a-995f-373cd9bf3043", ResourceVersion:"805", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 11, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8c87778f6", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"98941b21948bc6b97d7cfad0faae4b0a3f210ba6ed50848747fd2a74cb8afe66", Pod:"calico-kube-controllers-8c87778f6-5nk9g", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.17.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali217e56a638c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:12:08.515365 env[1554]: 2024-07-02 11:12:08.484 [INFO][5377] k8s.go 608: Cleaning up netns ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Jul 2 11:12:08.515365 env[1554]: 2024-07-02 11:12:08.484 [INFO][5377] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" iface="eth0" netns="" Jul 2 11:12:08.515365 env[1554]: 2024-07-02 11:12:08.484 [INFO][5377] k8s.go 615: Releasing IP address(es) ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Jul 2 11:12:08.515365 env[1554]: 2024-07-02 11:12:08.484 [INFO][5377] utils.go 188: Calico CNI releasing IP address ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Jul 2 11:12:08.515365 env[1554]: 2024-07-02 11:12:08.504 [INFO][5396] ipam_plugin.go 411: Releasing address using handleID ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" HandleID="k8s-pod-network.560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" Jul 2 11:12:08.515365 env[1554]: 2024-07-02 11:12:08.504 [INFO][5396] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:12:08.515365 env[1554]: 2024-07-02 11:12:08.504 [INFO][5396] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:12:08.515365 env[1554]: 2024-07-02 11:12:08.511 [WARNING][5396] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" HandleID="k8s-pod-network.560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" Jul 2 11:12:08.515365 env[1554]: 2024-07-02 11:12:08.511 [INFO][5396] ipam_plugin.go 439: Releasing address using workloadID ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" HandleID="k8s-pod-network.560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--kube--controllers--8c87778f6--5nk9g-eth0" Jul 2 11:12:08.515365 env[1554]: 2024-07-02 11:12:08.513 [INFO][5396] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:12:08.515365 env[1554]: 2024-07-02 11:12:08.514 [INFO][5377] k8s.go 621: Teardown processing complete. ContainerID="560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6" Jul 2 11:12:08.515994 env[1554]: time="2024-07-02T11:12:08.515356466Z" level=info msg="TearDown network for sandbox \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\" successfully" Jul 2 11:12:08.517643 env[1554]: time="2024-07-02T11:12:08.517615863Z" level=info msg="RemovePodSandbox \"560e6b5af683118a248ac794516b14d0c3120cb1194c2b32df5813dfb5fb60b6\" returns successfully" Jul 2 11:12:11.712206 kubelet[2596]: I0702 11:12:11.712164 2596 topology_manager.go:215] "Topology Admit Handler" podUID="11765dc4-8bff-4579-b6e4-8223f3b09a96" podNamespace="calico-apiserver" podName="calico-apiserver-669957667c-xrfsb" Jul 2 11:12:11.711000 audit[5414]: NETFILTER_CFG table=filter:111 family=2 entries=9 op=nft_register_rule pid=5414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:12:11.716259 kubelet[2596]: I0702 11:12:11.716231 2596 topology_manager.go:215] "Topology Admit Handler" podUID="e80a2ed3-b8d7-412a-8fb1-fb0305bef3c6" podNamespace="calico-apiserver" podName="calico-apiserver-669957667c-59pf6" Jul 2 11:12:11.717167 systemd[1]: Created slice kubepods-besteffort-pod11765dc4_8bff_4579_b6e4_8223f3b09a96.slice. Jul 2 11:12:11.722170 systemd[1]: Created slice kubepods-besteffort-pode80a2ed3_b8d7_412a_8fb1_fb0305bef3c6.slice. Jul 2 11:12:11.738907 kernel: kauditd_printk_skb: 27 callbacks suppressed Jul 2 11:12:11.739030 kernel: audit: type=1325 audit(1719918731.711:1187): table=filter:111 family=2 entries=9 op=nft_register_rule pid=5414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:12:11.784418 kubelet[2596]: I0702 11:12:11.784395 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lgsg9\" (UniqueName: \"kubernetes.io/projected/e80a2ed3-b8d7-412a-8fb1-fb0305bef3c6-kube-api-access-lgsg9\") pod \"calico-apiserver-669957667c-59pf6\" (UID: \"e80a2ed3-b8d7-412a-8fb1-fb0305bef3c6\") " pod="calico-apiserver/calico-apiserver-669957667c-59pf6" Jul 2 11:12:11.784418 kubelet[2596]: I0702 11:12:11.784419 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vpddr\" (UniqueName: \"kubernetes.io/projected/11765dc4-8bff-4579-b6e4-8223f3b09a96-kube-api-access-vpddr\") pod \"calico-apiserver-669957667c-xrfsb\" (UID: \"11765dc4-8bff-4579-b6e4-8223f3b09a96\") " pod="calico-apiserver/calico-apiserver-669957667c-xrfsb" Jul 2 11:12:11.784551 kubelet[2596]: I0702 11:12:11.784430 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e80a2ed3-b8d7-412a-8fb1-fb0305bef3c6-calico-apiserver-certs\") pod \"calico-apiserver-669957667c-59pf6\" (UID: \"e80a2ed3-b8d7-412a-8fb1-fb0305bef3c6\") " pod="calico-apiserver/calico-apiserver-669957667c-59pf6" Jul 2 11:12:11.784551 kubelet[2596]: I0702 11:12:11.784441 2596 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/11765dc4-8bff-4579-b6e4-8223f3b09a96-calico-apiserver-certs\") pod \"calico-apiserver-669957667c-xrfsb\" (UID: \"11765dc4-8bff-4579-b6e4-8223f3b09a96\") " pod="calico-apiserver/calico-apiserver-669957667c-xrfsb" Jul 2 11:12:11.711000 audit[5414]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd8f5527f0 a2=0 a3=7ffd8f5527dc items=0 ppid=2850 pid=5414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:11.884960 kubelet[2596]: E0702 11:12:11.884933 2596 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 11:12:11.884960 kubelet[2596]: E0702 11:12:11.884954 2596 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 11:12:11.885136 kubelet[2596]: E0702 11:12:11.884986 2596 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/11765dc4-8bff-4579-b6e4-8223f3b09a96-calico-apiserver-certs podName:11765dc4-8bff-4579-b6e4-8223f3b09a96 nodeName:}" failed. No retries permitted until 2024-07-02 11:12:12.384971053 +0000 UTC m=+64.422649876 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/11765dc4-8bff-4579-b6e4-8223f3b09a96-calico-apiserver-certs") pod "calico-apiserver-669957667c-xrfsb" (UID: "11765dc4-8bff-4579-b6e4-8223f3b09a96") : secret "calico-apiserver-certs" not found Jul 2 11:12:11.885136 kubelet[2596]: E0702 11:12:11.884995 2596 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e80a2ed3-b8d7-412a-8fb1-fb0305bef3c6-calico-apiserver-certs podName:e80a2ed3-b8d7-412a-8fb1-fb0305bef3c6 nodeName:}" failed. No retries permitted until 2024-07-02 11:12:12.384990994 +0000 UTC m=+64.422669818 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/e80a2ed3-b8d7-412a-8fb1-fb0305bef3c6-calico-apiserver-certs") pod "calico-apiserver-669957667c-59pf6" (UID: "e80a2ed3-b8d7-412a-8fb1-fb0305bef3c6") : secret "calico-apiserver-certs" not found Jul 2 11:12:11.895041 kernel: audit: type=1300 audit(1719918731.711:1187): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd8f5527f0 a2=0 a3=7ffd8f5527dc items=0 ppid=2850 pid=5414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:11.711000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:12:11.895271 kernel: audit: type=1327 audit(1719918731.711:1187): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:12:11.712000 audit[5414]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=5414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:12:11.712000 audit[5414]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd8f5527f0 a2=0 a3=7ffd8f5527dc items=0 ppid=2850 pid=5414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.113657 kernel: audit: type=1325 audit(1719918731.712:1188): table=nat:112 family=2 entries=20 op=nft_register_rule pid=5414 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:12:12.113722 kernel: audit: type=1300 audit(1719918731.712:1188): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd8f5527f0 a2=0 a3=7ffd8f5527dc items=0 ppid=2850 pid=5414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.113739 kernel: audit: type=1327 audit(1719918731.712:1188): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:12:11.712000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:12:11.957000 audit[5419]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=5419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:12:11.957000 audit[5419]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd4e5fde10 a2=0 a3=7ffd4e5fddfc items=0 ppid=2850 pid=5419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.332726 kernel: audit: type=1325 audit(1719918731.957:1189): table=filter:113 family=2 entries=10 op=nft_register_rule pid=5419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:12:12.332769 kernel: audit: type=1300 audit(1719918731.957:1189): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd4e5fde10 a2=0 a3=7ffd4e5fddfc items=0 ppid=2850 pid=5419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.332797 kernel: audit: type=1327 audit(1719918731.957:1189): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:12:11.957000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:12:12.173000 audit[5419]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=5419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:12:12.173000 audit[5419]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd4e5fde10 a2=0 a3=7ffd4e5fddfc items=0 ppid=2850 pid=5419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.173000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:12:12.452269 kernel: audit: type=1325 audit(1719918732.173:1190): table=nat:114 family=2 entries=20 op=nft_register_rule pid=5419 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:12:12.620390 env[1554]: time="2024-07-02T11:12:12.620301181Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-669957667c-xrfsb,Uid:11765dc4-8bff-4579-b6e4-8223f3b09a96,Namespace:calico-apiserver,Attempt:0,}" Jul 2 11:12:12.625677 env[1554]: time="2024-07-02T11:12:12.625577242Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-669957667c-59pf6,Uid:e80a2ed3-b8d7-412a-8fb1-fb0305bef3c6,Namespace:calico-apiserver,Attempt:0,}" Jul 2 11:12:12.693174 systemd-networkd[1298]: cali5756e944d26: Link UP Jul 2 11:12:12.749648 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 11:12:12.749729 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5756e944d26: link becomes ready Jul 2 11:12:12.749718 systemd-networkd[1298]: cali5756e944d26: Gained carrier Jul 2 11:12:12.750585 systemd-networkd[1298]: calic4cbaca6ac8: Link UP Jul 2 11:12:12.778994 systemd-networkd[1298]: calic4cbaca6ac8: Gained carrier Jul 2 11:12:12.779274 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic4cbaca6ac8: link becomes ready Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.654 [INFO][5433] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--59pf6-eth0 calico-apiserver-669957667c- calico-apiserver e80a2ed3-b8d7-412a-8fb1-fb0305bef3c6 861 0 2024-07-02 11:12:11 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:669957667c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.5-a-18871bf0db calico-apiserver-669957667c-59pf6 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5756e944d26 [] []}} ContainerID="7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" Namespace="calico-apiserver" Pod="calico-apiserver-669957667c-59pf6" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--59pf6-" Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.654 [INFO][5433] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" Namespace="calico-apiserver" Pod="calico-apiserver-669957667c-59pf6" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--59pf6-eth0" Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.671 [INFO][5467] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" HandleID="k8s-pod-network.7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--59pf6-eth0" Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.676 [INFO][5467] ipam_plugin.go 264: Auto assigning IP ContainerID="7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" HandleID="k8s-pod-network.7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--59pf6-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050630), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.5-a-18871bf0db", "pod":"calico-apiserver-669957667c-59pf6", "timestamp":"2024-07-02 11:12:12.67117644 +0000 UTC"}, Hostname:"ci-3510.3.5-a-18871bf0db", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.676 [INFO][5467] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.676 [INFO][5467] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.676 [INFO][5467] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-18871bf0db' Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.677 [INFO][5467] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.680 [INFO][5467] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.682 [INFO][5467] ipam.go 489: Trying affinity for 192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.684 [INFO][5467] ipam.go 155: Attempting to load block cidr=192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.685 [INFO][5467] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.685 [INFO][5467] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.0/26 handle="k8s-pod-network.7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.686 [INFO][5467] ipam.go 1685: Creating new handle: k8s-pod-network.7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1 Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.688 [INFO][5467] ipam.go 1203: Writing block in order to claim IPs block=192.168.17.0/26 handle="k8s-pod-network.7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.691 [INFO][5467] ipam.go 1216: Successfully claimed IPs: [192.168.17.5/26] block=192.168.17.0/26 handle="k8s-pod-network.7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.691 [INFO][5467] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.5/26] handle="k8s-pod-network.7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.691 [INFO][5467] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:12:12.780288 env[1554]: 2024-07-02 11:12:12.691 [INFO][5467] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.17.5/26] IPv6=[] ContainerID="7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" HandleID="k8s-pod-network.7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--59pf6-eth0" Jul 2 11:12:12.780799 env[1554]: 2024-07-02 11:12:12.692 [INFO][5433] k8s.go 386: Populated endpoint ContainerID="7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" Namespace="calico-apiserver" Pod="calico-apiserver-669957667c-59pf6" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--59pf6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--59pf6-eth0", GenerateName:"calico-apiserver-669957667c-", Namespace:"calico-apiserver", SelfLink:"", UID:"e80a2ed3-b8d7-412a-8fb1-fb0305bef3c6", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 12, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"669957667c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"", Pod:"calico-apiserver-669957667c-59pf6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.17.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5756e944d26", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:12:12.780799 env[1554]: 2024-07-02 11:12:12.692 [INFO][5433] k8s.go 387: Calico CNI using IPs: [192.168.17.5/32] ContainerID="7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" Namespace="calico-apiserver" Pod="calico-apiserver-669957667c-59pf6" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--59pf6-eth0" Jul 2 11:12:12.780799 env[1554]: 2024-07-02 11:12:12.692 [INFO][5433] dataplane_linux.go 68: Setting the host side veth name to cali5756e944d26 ContainerID="7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" Namespace="calico-apiserver" Pod="calico-apiserver-669957667c-59pf6" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--59pf6-eth0" Jul 2 11:12:12.780799 env[1554]: 2024-07-02 11:12:12.749 [INFO][5433] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" Namespace="calico-apiserver" Pod="calico-apiserver-669957667c-59pf6" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--59pf6-eth0" Jul 2 11:12:12.780799 env[1554]: 2024-07-02 11:12:12.749 [INFO][5433] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" Namespace="calico-apiserver" Pod="calico-apiserver-669957667c-59pf6" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--59pf6-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--59pf6-eth0", GenerateName:"calico-apiserver-669957667c-", Namespace:"calico-apiserver", SelfLink:"", UID:"e80a2ed3-b8d7-412a-8fb1-fb0305bef3c6", ResourceVersion:"861", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 12, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"669957667c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1", Pod:"calico-apiserver-669957667c-59pf6", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.17.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5756e944d26", MAC:"6e:0a:b8:06:9f:68", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:12:12.780799 env[1554]: 2024-07-02 11:12:12.779 [INFO][5433] k8s.go 500: Wrote updated endpoint to datastore ContainerID="7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1" Namespace="calico-apiserver" Pod="calico-apiserver-669957667c-59pf6" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--59pf6-eth0" Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.654 [INFO][5423] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--xrfsb-eth0 calico-apiserver-669957667c- calico-apiserver 11765dc4-8bff-4579-b6e4-8223f3b09a96 859 0 2024-07-02 11:12:11 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:669957667c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.5-a-18871bf0db calico-apiserver-669957667c-xrfsb eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calic4cbaca6ac8 [] []}} ContainerID="ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" Namespace="calico-apiserver" Pod="calico-apiserver-669957667c-xrfsb" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--xrfsb-" Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.654 [INFO][5423] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" Namespace="calico-apiserver" Pod="calico-apiserver-669957667c-xrfsb" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--xrfsb-eth0" Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.671 [INFO][5466] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" HandleID="k8s-pod-network.ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--xrfsb-eth0" Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.676 [INFO][5466] ipam_plugin.go 264: Auto assigning IP ContainerID="ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" HandleID="k8s-pod-network.ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--xrfsb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e9360), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.5-a-18871bf0db", "pod":"calico-apiserver-669957667c-xrfsb", "timestamp":"2024-07-02 11:12:12.671176415 +0000 UTC"}, Hostname:"ci-3510.3.5-a-18871bf0db", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.676 [INFO][5466] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.691 [INFO][5466] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.691 [INFO][5466] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.5-a-18871bf0db' Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.692 [INFO][5466] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.696 [INFO][5466] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.699 [INFO][5466] ipam.go 489: Trying affinity for 192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.700 [INFO][5466] ipam.go 155: Attempting to load block cidr=192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.701 [INFO][5466] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.17.0/26 host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.701 [INFO][5466] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.17.0/26 handle="k8s-pod-network.ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.702 [INFO][5466] ipam.go 1685: Creating new handle: k8s-pod-network.ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833 Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.705 [INFO][5466] ipam.go 1203: Writing block in order to claim IPs block=192.168.17.0/26 handle="k8s-pod-network.ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.708 [INFO][5466] ipam.go 1216: Successfully claimed IPs: [192.168.17.6/26] block=192.168.17.0/26 handle="k8s-pod-network.ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.708 [INFO][5466] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.17.6/26] handle="k8s-pod-network.ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" host="ci-3510.3.5-a-18871bf0db" Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.708 [INFO][5466] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 11:12:12.784886 env[1554]: 2024-07-02 11:12:12.708 [INFO][5466] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.17.6/26] IPv6=[] ContainerID="ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" HandleID="k8s-pod-network.ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" Workload="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--xrfsb-eth0" Jul 2 11:12:12.785371 env[1554]: 2024-07-02 11:12:12.709 [INFO][5423] k8s.go 386: Populated endpoint ContainerID="ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" Namespace="calico-apiserver" Pod="calico-apiserver-669957667c-xrfsb" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--xrfsb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--xrfsb-eth0", GenerateName:"calico-apiserver-669957667c-", Namespace:"calico-apiserver", SelfLink:"", UID:"11765dc4-8bff-4579-b6e4-8223f3b09a96", ResourceVersion:"859", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 12, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"669957667c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"", Pod:"calico-apiserver-669957667c-xrfsb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.17.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic4cbaca6ac8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:12:12.785371 env[1554]: 2024-07-02 11:12:12.709 [INFO][5423] k8s.go 387: Calico CNI using IPs: [192.168.17.6/32] ContainerID="ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" Namespace="calico-apiserver" Pod="calico-apiserver-669957667c-xrfsb" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--xrfsb-eth0" Jul 2 11:12:12.785371 env[1554]: 2024-07-02 11:12:12.709 [INFO][5423] dataplane_linux.go 68: Setting the host side veth name to calic4cbaca6ac8 ContainerID="ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" Namespace="calico-apiserver" Pod="calico-apiserver-669957667c-xrfsb" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--xrfsb-eth0" Jul 2 11:12:12.785371 env[1554]: 2024-07-02 11:12:12.778 [INFO][5423] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" Namespace="calico-apiserver" Pod="calico-apiserver-669957667c-xrfsb" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--xrfsb-eth0" Jul 2 11:12:12.785371 env[1554]: 2024-07-02 11:12:12.779 [INFO][5423] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" Namespace="calico-apiserver" Pod="calico-apiserver-669957667c-xrfsb" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--xrfsb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--xrfsb-eth0", GenerateName:"calico-apiserver-669957667c-", Namespace:"calico-apiserver", SelfLink:"", UID:"11765dc4-8bff-4579-b6e4-8223f3b09a96", ResourceVersion:"859", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 11, 12, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"669957667c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.5-a-18871bf0db", ContainerID:"ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833", Pod:"calico-apiserver-669957667c-xrfsb", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.17.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calic4cbaca6ac8", MAC:"ae:45:af:69:89:a5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 11:12:12.785371 env[1554]: 2024-07-02 11:12:12.783 [INFO][5423] k8s.go 500: Wrote updated endpoint to datastore ContainerID="ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833" Namespace="calico-apiserver" Pod="calico-apiserver-669957667c-xrfsb" WorkloadEndpoint="ci--3510.3.5--a--18871bf0db-k8s-calico--apiserver--669957667c--xrfsb-eth0" Jul 2 11:12:12.786567 env[1554]: time="2024-07-02T11:12:12.786527530Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:12:12.786567 env[1554]: time="2024-07-02T11:12:12.786555319Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:12:12.786567 env[1554]: time="2024-07-02T11:12:12.786562898Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:12:12.786701 env[1554]: time="2024-07-02T11:12:12.786676251Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1 pid=5526 runtime=io.containerd.runc.v2 Jul 2 11:12:12.786000 audit[5537]: NETFILTER_CFG table=filter:115 family=2 entries=51 op=nft_register_chain pid=5537 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:12:12.786000 audit[5537]: SYSCALL arch=c000003e syscall=46 success=yes exit=26260 a0=3 a1=7fff9b547830 a2=0 a3=7fff9b54781c items=0 ppid=3829 pid=5537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.786000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:12:12.791185 env[1554]: time="2024-07-02T11:12:12.791148419Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 11:12:12.791185 env[1554]: time="2024-07-02T11:12:12.791170631Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 11:12:12.791185 env[1554]: time="2024-07-02T11:12:12.791177557Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 11:12:12.791390 env[1554]: time="2024-07-02T11:12:12.791241690Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833 pid=5560 runtime=io.containerd.runc.v2 Jul 2 11:12:12.793053 systemd[1]: Started cri-containerd-7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1.scope. Jul 2 11:12:12.794000 audit[5581]: NETFILTER_CFG table=filter:116 family=2 entries=45 op=nft_register_chain pid=5581 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 11:12:12.794000 audit[5581]: SYSCALL arch=c000003e syscall=46 success=yes exit=23096 a0=3 a1=7ffe7856a660 a2=0 a3=7ffe7856a64c items=0 ppid=3829 pid=5581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.794000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 11:12:12.796984 systemd[1]: Started cri-containerd-ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833.scope. Jul 2 11:12:12.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit: BPF prog-id=174 op=LOAD Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { bpf } for pid=5545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5526 pid=5545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765656465666164366565656234643239316238303839666338616333 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { perfmon } for pid=5545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5526 pid=5545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765656465666164366565656234643239316238303839666338616333 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { bpf } for pid=5545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { bpf } for pid=5545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { bpf } for pid=5545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { perfmon } for pid=5545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { perfmon } for pid=5545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { perfmon } for pid=5545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { perfmon } for pid=5545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { perfmon } for pid=5545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { bpf } for pid=5545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { bpf } for pid=5545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit: BPF prog-id=175 op=LOAD Jul 2 11:12:12.798000 audit[5545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002edd90 items=0 ppid=5526 pid=5545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765656465666164366565656234643239316238303839666338616333 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { bpf } for pid=5545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { bpf } for pid=5545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { perfmon } for pid=5545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { perfmon } for pid=5545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { perfmon } for pid=5545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { perfmon } for pid=5545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { perfmon } for pid=5545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { bpf } for pid=5545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { bpf } for pid=5545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit: BPF prog-id=176 op=LOAD Jul 2 11:12:12.798000 audit[5545]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002eddd8 items=0 ppid=5526 pid=5545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765656465666164366565656234643239316238303839666338616333 Jul 2 11:12:12.798000 audit: BPF prog-id=176 op=UNLOAD Jul 2 11:12:12.798000 audit: BPF prog-id=175 op=UNLOAD Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { bpf } for pid=5545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { bpf } for pid=5545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { bpf } for pid=5545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { perfmon } for pid=5545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { perfmon } for pid=5545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { perfmon } for pid=5545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { perfmon } for pid=5545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { perfmon } for pid=5545 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { bpf } for pid=5545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit[5545]: AVC avc: denied { bpf } for pid=5545 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.798000 audit: BPF prog-id=177 op=LOAD Jul 2 11:12:12.798000 audit[5545]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e61e8 items=0 ppid=5526 pid=5545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765656465666164366565656234643239316238303839666338616333 Jul 2 11:12:12.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.802000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.802000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit: BPF prog-id=178 op=LOAD Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=5560 pid=5574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564653936323863393730666334633061336136383138323631643662 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=5560 pid=5574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564653936323863393730666334633061336136383138323631643662 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit: BPF prog-id=179 op=LOAD Jul 2 11:12:12.803000 audit[5574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0000f9d90 items=0 ppid=5560 pid=5574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564653936323863393730666334633061336136383138323631643662 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit: BPF prog-id=180 op=LOAD Jul 2 11:12:12.803000 audit[5574]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0000f9dd8 items=0 ppid=5560 pid=5574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564653936323863393730666334633061336136383138323631643662 Jul 2 11:12:12.803000 audit: BPF prog-id=180 op=UNLOAD Jul 2 11:12:12.803000 audit: BPF prog-id=179 op=UNLOAD Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { perfmon } for pid=5574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit[5574]: AVC avc: denied { bpf } for pid=5574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:12.803000 audit: BPF prog-id=181 op=LOAD Jul 2 11:12:12.803000 audit[5574]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0003ee1e8 items=0 ppid=5560 pid=5574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:12.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564653936323863393730666334633061336136383138323631643662 Jul 2 11:12:12.816490 env[1554]: time="2024-07-02T11:12:12.816437534Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-669957667c-59pf6,Uid:e80a2ed3-b8d7-412a-8fb1-fb0305bef3c6,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1\"" Jul 2 11:12:12.817182 env[1554]: time="2024-07-02T11:12:12.817168751Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 11:12:12.820857 env[1554]: time="2024-07-02T11:12:12.820831635Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-669957667c-xrfsb,Uid:11765dc4-8bff-4579-b6e4-8223f3b09a96,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833\"" Jul 2 11:12:13.902606 systemd-networkd[1298]: calic4cbaca6ac8: Gained IPv6LL Jul 2 11:12:13.903321 systemd-networkd[1298]: cali5756e944d26: Gained IPv6LL Jul 2 11:12:15.510971 env[1554]: time="2024-07-02T11:12:15.510897206Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:12:15.511824 env[1554]: time="2024-07-02T11:12:15.511769239Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:12:15.513392 env[1554]: time="2024-07-02T11:12:15.513344580Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:12:15.515113 env[1554]: time="2024-07-02T11:12:15.515059477Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:12:15.515597 env[1554]: time="2024-07-02T11:12:15.515541509Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 11:12:15.516593 env[1554]: time="2024-07-02T11:12:15.516567289Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\"" Jul 2 11:12:15.517572 env[1554]: time="2024-07-02T11:12:15.517545130Z" level=info msg="CreateContainer within sandbox \"7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 11:12:15.523363 env[1554]: time="2024-07-02T11:12:15.523332300Z" level=info msg="CreateContainer within sandbox \"7eedefad6eeeb4d291b8089fc8ac32c53b78032c58589df481bbe1d06a381da1\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c7e56aef2979711dc458eee1f030de9c2f88dbc2c4d7fabb147f8a6863a1ec72\"" Jul 2 11:12:15.523666 env[1554]: time="2024-07-02T11:12:15.523644043Z" level=info msg="StartContainer for \"c7e56aef2979711dc458eee1f030de9c2f88dbc2c4d7fabb147f8a6863a1ec72\"" Jul 2 11:12:15.536740 systemd[1]: Started cri-containerd-c7e56aef2979711dc458eee1f030de9c2f88dbc2c4d7fabb147f8a6863a1ec72.scope. Jul 2 11:12:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit: BPF prog-id=182 op=LOAD Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { bpf } for pid=5627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=5526 pid=5627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:15.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337653536616566323937393731316463343538656565316630333064 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { perfmon } for pid=5627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=5526 pid=5627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:15.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337653536616566323937393731316463343538656565316630333064 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { bpf } for pid=5627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { bpf } for pid=5627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { bpf } for pid=5627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { perfmon } for pid=5627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { perfmon } for pid=5627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { perfmon } for pid=5627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { perfmon } for pid=5627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { perfmon } for pid=5627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { bpf } for pid=5627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { bpf } for pid=5627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit: BPF prog-id=183 op=LOAD Jul 2 11:12:15.541000 audit[5627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000025390 items=0 ppid=5526 pid=5627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:15.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337653536616566323937393731316463343538656565316630333064 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { bpf } for pid=5627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { bpf } for pid=5627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { perfmon } for pid=5627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { perfmon } for pid=5627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { perfmon } for pid=5627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { perfmon } for pid=5627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { perfmon } for pid=5627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { bpf } for pid=5627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { bpf } for pid=5627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit: BPF prog-id=184 op=LOAD Jul 2 11:12:15.541000 audit[5627]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0000253d8 items=0 ppid=5526 pid=5627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:15.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337653536616566323937393731316463343538656565316630333064 Jul 2 11:12:15.541000 audit: BPF prog-id=184 op=UNLOAD Jul 2 11:12:15.541000 audit: BPF prog-id=183 op=UNLOAD Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { bpf } for pid=5627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { bpf } for pid=5627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { bpf } for pid=5627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { perfmon } for pid=5627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { perfmon } for pid=5627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { perfmon } for pid=5627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { perfmon } for pid=5627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { perfmon } for pid=5627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { bpf } for pid=5627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit[5627]: AVC avc: denied { bpf } for pid=5627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.541000 audit: BPF prog-id=185 op=LOAD Jul 2 11:12:15.541000 audit[5627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0000257e8 items=0 ppid=5526 pid=5627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:15.541000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337653536616566323937393731316463343538656565316630333064 Jul 2 11:12:15.559069 env[1554]: time="2024-07-02T11:12:15.559045204Z" level=info msg="StartContainer for \"c7e56aef2979711dc458eee1f030de9c2f88dbc2c4d7fabb147f8a6863a1ec72\" returns successfully" Jul 2 11:12:15.834441 env[1554]: time="2024-07-02T11:12:15.834330577Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:12:15.835197 env[1554]: time="2024-07-02T11:12:15.835184269Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:12:15.836124 env[1554]: time="2024-07-02T11:12:15.836076159Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:12:15.837075 env[1554]: time="2024-07-02T11:12:15.837034786Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:e8f124312a4c41451e51bfc00b6e98929e9eb0510905f3301542719a3e8d2fec,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 11:12:15.837354 env[1554]: time="2024-07-02T11:12:15.837341871Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.28.0\" returns image reference \"sha256:6c07591fd1cfafb48d575f75a6b9d8d3cc03bead5b684908ef5e7dd3132794d6\"" Jul 2 11:12:15.838951 env[1554]: time="2024-07-02T11:12:15.838918256Z" level=info msg="CreateContainer within sandbox \"ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Jul 2 11:12:15.843496 env[1554]: time="2024-07-02T11:12:15.843483221Z" level=info msg="CreateContainer within sandbox \"ede9628c970fc4c0a3a6818261d6bd9803e354cd8b35e363663caf8a1c514833\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5734105df4dad17edc594ac3332428c5a3dbc62e559cdd711cc838968743b9ff\"" Jul 2 11:12:15.843737 env[1554]: time="2024-07-02T11:12:15.843706729Z" level=info msg="StartContainer for \"5734105df4dad17edc594ac3332428c5a3dbc62e559cdd711cc838968743b9ff\"" Jul 2 11:12:15.852912 systemd[1]: Started cri-containerd-5734105df4dad17edc594ac3332428c5a3dbc62e559cdd711cc838968743b9ff.scope. Jul 2 11:12:15.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.858000 audit: BPF prog-id=186 op=LOAD Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { bpf } for pid=5676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000217c48 a2=10 a3=1c items=0 ppid=5560 pid=5676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:15.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333431303564663464616431376564633539346163333333323432 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { perfmon } for pid=5676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0002176b0 a2=3c a3=8 items=0 ppid=5560 pid=5676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:15.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333431303564663464616431376564633539346163333333323432 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { bpf } for pid=5676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { bpf } for pid=5676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { bpf } for pid=5676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { perfmon } for pid=5676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { perfmon } for pid=5676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { perfmon } for pid=5676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { perfmon } for pid=5676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { perfmon } for pid=5676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { bpf } for pid=5676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { bpf } for pid=5676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit: BPF prog-id=187 op=LOAD Jul 2 11:12:15.859000 audit[5676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0002179d8 a2=78 a3=c00010f1c0 items=0 ppid=5560 pid=5676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:15.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333431303564663464616431376564633539346163333333323432 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { bpf } for pid=5676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { bpf } for pid=5676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { perfmon } for pid=5676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { perfmon } for pid=5676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { perfmon } for pid=5676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { perfmon } for pid=5676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { perfmon } for pid=5676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { bpf } for pid=5676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { bpf } for pid=5676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit: BPF prog-id=188 op=LOAD Jul 2 11:12:15.859000 audit[5676]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000217770 a2=78 a3=c00010f208 items=0 ppid=5560 pid=5676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:15.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333431303564663464616431376564633539346163333333323432 Jul 2 11:12:15.859000 audit: BPF prog-id=188 op=UNLOAD Jul 2 11:12:15.859000 audit: BPF prog-id=187 op=UNLOAD Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { bpf } for pid=5676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { bpf } for pid=5676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { bpf } for pid=5676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { perfmon } for pid=5676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { perfmon } for pid=5676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { perfmon } for pid=5676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { perfmon } for pid=5676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { perfmon } for pid=5676 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { bpf } for pid=5676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit[5676]: AVC avc: denied { bpf } for pid=5676 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 11:12:15.859000 audit: BPF prog-id=189 op=LOAD Jul 2 11:12:15.859000 audit[5676]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000217c30 a2=78 a3=c00010f618 items=0 ppid=5560 pid=5676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:15.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333431303564663464616431376564633539346163333333323432 Jul 2 11:12:15.877384 env[1554]: time="2024-07-02T11:12:15.877332594Z" level=info msg="StartContainer for \"5734105df4dad17edc594ac3332428c5a3dbc62e559cdd711cc838968743b9ff\" returns successfully" Jul 2 11:12:15.949000 audit[5637]: AVC avc: denied { watch } for pid=5637 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.4023250919/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c977 tclass=file permissive=0 Jul 2 11:12:15.949000 audit[5637]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000722100 a2=fc6 a3=0 items=0 ppid=5526 pid=5637 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 key=(null) Jul 2 11:12:15.949000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:12:16.228000 audit[5686]: AVC avc: denied { watch } for pid=5686 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.1092965845/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c783,c908 tclass=file permissive=0 Jul 2 11:12:16.228000 audit[5686]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0001d4740 a2=fc6 a3=0 items=0 ppid=5560 pid=5686 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 key=(null) Jul 2 11:12:16.228000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:12:16.273138 kubelet[2596]: I0702 11:12:16.273099 2596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-669957667c-59pf6" podStartSLOduration=2.573691959 podStartE2EDuration="5.273085314s" podCreationTimestamp="2024-07-02 11:12:11 +0000 UTC" firstStartedPulling="2024-07-02 11:12:12.817035075 +0000 UTC m=+64.854713899" lastFinishedPulling="2024-07-02 11:12:15.516428413 +0000 UTC m=+67.554107254" observedRunningTime="2024-07-02 11:12:16.272423649 +0000 UTC m=+68.310102477" watchObservedRunningTime="2024-07-02 11:12:16.273085314 +0000 UTC m=+68.310764139" Jul 2 11:12:16.277277 kubelet[2596]: I0702 11:12:16.277230 2596 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-669957667c-xrfsb" podStartSLOduration=2.260783071 podStartE2EDuration="5.277212083s" podCreationTimestamp="2024-07-02 11:12:11 +0000 UTC" firstStartedPulling="2024-07-02 11:12:12.821423393 +0000 UTC m=+64.859102226" lastFinishedPulling="2024-07-02 11:12:15.837852403 +0000 UTC m=+67.875531238" observedRunningTime="2024-07-02 11:12:16.277166938 +0000 UTC m=+68.314845772" watchObservedRunningTime="2024-07-02 11:12:16.277212083 +0000 UTC m=+68.314890911" Jul 2 11:12:16.277000 audit[5719]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=5719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:12:16.277000 audit[5719]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcb9571e60 a2=0 a3=7ffcb9571e4c items=0 ppid=2850 pid=5719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:16.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:12:16.277000 audit[5719]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=5719 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:12:16.277000 audit[5719]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcb9571e60 a2=0 a3=7ffcb9571e4c items=0 ppid=2850 pid=5719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:16.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:12:16.289000 audit[5721]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=5721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:12:16.289000 audit[5721]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcd43bc590 a2=0 a3=7ffcd43bc57c items=0 ppid=2850 pid=5721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:16.289000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:12:16.296000 audit[5721]: NETFILTER_CFG table=nat:120 family=2 entries=31 op=nft_register_chain pid=5721 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:12:16.296000 audit[5721]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcd43bc590 a2=0 a3=7ffcd43bc57c items=0 ppid=2850 pid=5721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:12:16.296000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:13:04.083000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:13:04.110414 kernel: kauditd_printk_skb: 254 callbacks suppressed Jul 2 11:13:04.110466 kernel: audit: type=1400 audit(1719918784.083:1271): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:13:04.083000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c010412e10 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:13:04.295246 kernel: audit: type=1300 audit(1719918784.083:1271): arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c010412e10 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:13:04.295285 kernel: audit: type=1327 audit(1719918784.083:1271): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:13:04.083000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:13:04.386390 kernel: audit: type=1400 audit(1719918784.083:1272): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:13:04.083000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:13:04.476340 kernel: audit: type=1300 audit(1719918784.083:1272): arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00e6cbb30 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:13:04.083000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00e6cbb30 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:13:04.572009 kernel: audit: type=1327 audit(1719918784.083:1272): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:13:04.083000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:13:04.662480 kernel: audit: type=1400 audit(1719918784.083:1273): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:13:04.083000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:13:04.751621 kernel: audit: type=1300 audit(1719918784.083:1273): arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c010412e40 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:13:04.083000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c010412e40 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:13:04.848065 kernel: audit: type=1327 audit(1719918784.083:1273): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:13:04.083000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:13:04.939260 kernel: audit: type=1400 audit(1719918784.083:1274): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:13:04.083000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:13:04.083000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c005621c20 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:13:04.083000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:13:04.083000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:13:04.083000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:13:04.083000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00f6920f0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:13:04.083000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:13:04.083000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00d750940 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:13:04.083000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:13:04.170000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:13:04.170000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003153aa0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:13:04.170000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:13:04.170000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:13:04.170000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016db050 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:13:04.170000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:13:07.325000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:13:07.325000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00380e340 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:13:07.325000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:13:07.325000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:13:07.325000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00380e360 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:13:07.325000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:13:07.325000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:13:07.325000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0035d6280 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:13:07.325000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:13:07.326000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:13:07.326000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f49360 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:13:07.326000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:13:15.952000 audit[5637]: AVC avc: denied { watch } for pid=5637 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.4023250919/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c977 tclass=file permissive=0 Jul 2 11:13:15.979169 kernel: kauditd_printk_skb: 26 callbacks suppressed Jul 2 11:13:15.979208 kernel: audit: type=1400 audit(1719918795.952:1283): avc: denied { watch } for pid=5637 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.4023250919/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c977 tclass=file permissive=0 Jul 2 11:13:15.952000 audit[5637]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001174580 a2=fc6 a3=0 items=0 ppid=5526 pid=5637 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 key=(null) Jul 2 11:13:16.189462 kernel: audit: type=1300 audit(1719918795.952:1283): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001174580 a2=fc6 a3=0 items=0 ppid=5526 pid=5637 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 key=(null) Jul 2 11:13:16.189497 kernel: audit: type=1327 audit(1719918795.952:1283): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:13:15.952000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:13:16.281533 kernel: audit: type=1400 audit(1719918796.229:1284): avc: denied { watch } for pid=5686 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.1092965845/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c783,c908 tclass=file permissive=0 Jul 2 11:13:16.229000 audit[5686]: AVC avc: denied { watch } for pid=5686 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.1092965845/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c783,c908 tclass=file permissive=0 Jul 2 11:13:16.374813 kernel: audit: type=1300 audit(1719918796.229:1284): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018b7720 a2=fc6 a3=0 items=0 ppid=5560 pid=5686 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 key=(null) Jul 2 11:13:16.229000 audit[5686]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018b7720 a2=fc6 a3=0 items=0 ppid=5560 pid=5686 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 key=(null) Jul 2 11:13:16.494743 kernel: audit: type=1327 audit(1719918796.229:1284): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:13:16.229000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:14:03.337468 systemd[1]: sshd@8-147.75.203.5:22-112.54.220.94:54836.service: Deactivated successfully. Jul 2 11:14:03.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.203.5:22-112.54.220.94:54836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:14:03.429269 kernel: audit: type=1131 audit(1719918843.336:1285): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-147.75.203.5:22-112.54.220.94:54836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:14:04.082000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:14:04.082000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00f37e120 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:14:04.274599 kernel: audit: type=1400 audit(1719918844.082:1286): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:14:04.274641 kernel: audit: type=1300 audit(1719918844.082:1286): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00f37e120 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:14:04.274658 kernel: audit: type=1327 audit(1719918844.082:1286): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:14:04.082000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:14:04.367787 kernel: audit: type=1400 audit(1719918844.082:1288): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:14:04.082000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:14:04.459255 kernel: audit: type=1400 audit(1719918844.082:1287): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:14:04.082000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:14:04.550349 kernel: audit: type=1300 audit(1719918844.082:1288): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0100ced80 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:14:04.082000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0100ced80 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:14:04.648658 kernel: audit: type=1300 audit(1719918844.082:1287): arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0109ffce0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:14:04.082000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0109ffce0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:14:04.747129 kernel: audit: type=1327 audit(1719918844.082:1288): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:14:04.082000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:14:04.840634 kernel: audit: type=1327 audit(1719918844.082:1287): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:14:04.082000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:14:04.082000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:14:04.082000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c009f215c0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:14:04.082000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:14:04.083000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:14:04.083000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00df050e0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:14:04.083000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:14:04.083000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:14:04.083000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00592e420 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:14:04.083000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:14:04.169000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:14:04.169000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d97600 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:14:04.169000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:14:04.169000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:14:04.169000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029873e0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:14:04.169000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:14:07.325000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:14:07.325000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:14:07.325000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d97720 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:14:07.325000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b23220 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:14:07.325000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:14:07.325000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:14:07.325000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:14:07.325000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c00124d660 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:14:07.325000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:14:07.325000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:14:07.325000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002b23240 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:14:07.325000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:14:15.951000 audit[5637]: AVC avc: denied { watch } for pid=5637 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.4023250919/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c977 tclass=file permissive=0 Jul 2 11:14:15.979890 kernel: kauditd_printk_skb: 27 callbacks suppressed Jul 2 11:14:15.979942 kernel: audit: type=1400 audit(1719918855.951:1298): avc: denied { watch } for pid=5637 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.4023250919/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c977 tclass=file permissive=0 Jul 2 11:14:15.951000 audit[5637]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0014a2360 a2=fc6 a3=0 items=0 ppid=5526 pid=5637 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 key=(null) Jul 2 11:14:16.197336 kernel: audit: type=1300 audit(1719918855.951:1298): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0014a2360 a2=fc6 a3=0 items=0 ppid=5526 pid=5637 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 key=(null) Jul 2 11:14:16.197370 kernel: audit: type=1327 audit(1719918855.951:1298): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:14:15.951000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:14:16.229000 audit[5686]: AVC avc: denied { watch } for pid=5686 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.1092965845/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c783,c908 tclass=file permissive=0 Jul 2 11:14:16.386830 kernel: audit: type=1400 audit(1719918856.229:1299): avc: denied { watch } for pid=5686 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.1092965845/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c783,c908 tclass=file permissive=0 Jul 2 11:14:16.386871 kernel: audit: type=1300 audit(1719918856.229:1299): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001738d00 a2=fc6 a3=0 items=0 ppid=5560 pid=5686 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 key=(null) Jul 2 11:14:16.229000 audit[5686]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001738d00 a2=fc6 a3=0 items=0 ppid=5560 pid=5686 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 key=(null) Jul 2 11:14:16.229000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:14:16.604791 kernel: audit: type=1327 audit(1719918856.229:1299): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:15:04.083000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:15:04.083000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00e9751e0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:15:04.275134 kernel: audit: type=1400 audit(1719918904.083:1300): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:15:04.275181 kernel: audit: type=1300 audit(1719918904.083:1300): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00e9751e0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:15:04.275203 kernel: audit: type=1327 audit(1719918904.083:1300): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:15:04.083000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:15:04.368546 kernel: audit: type=1400 audit(1719918904.083:1301): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:15:04.083000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:15:04.458631 kernel: audit: type=1300 audit(1719918904.083:1301): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00658bda0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:15:04.083000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00658bda0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:15:04.557245 kernel: audit: type=1327 audit(1719918904.083:1301): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:15:04.083000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:15:04.650645 kernel: audit: type=1400 audit(1719918904.083:1302): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:15:04.083000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:15:04.742024 kernel: audit: type=1300 audit(1719918904.083:1302): arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c007bf9d10 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:15:04.083000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c007bf9d10 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:15:04.841692 kernel: audit: type=1327 audit(1719918904.083:1302): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:15:04.083000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:15:04.937409 kernel: audit: type=1400 audit(1719918904.083:1303): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:15:04.083000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:15:04.083000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c005e353b0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:15:04.083000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:15:04.083000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:15:04.083000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0076deb10 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:15:04.083000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:15:04.083000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:15:04.083000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c006a2def0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:15:04.083000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:15:04.169000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:15:04.169000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b0fb60 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:15:04.169000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:15:04.169000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:15:04.169000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d12800 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:15:04.169000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:15:07.326000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:15:07.326000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003921120 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:15:07.326000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:15:07.326000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:15:07.326000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0039874a0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:15:07.326000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:15:07.326000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:15:07.326000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d12920 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:15:07.326000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:15:07.326000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:15:07.326000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002b23260 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:15:07.326000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:15:15.952000 audit[5637]: AVC avc: denied { watch } for pid=5637 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.4023250919/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c977 tclass=file permissive=0 Jul 2 11:15:15.980475 kernel: kauditd_printk_skb: 26 callbacks suppressed Jul 2 11:15:15.980517 kernel: audit: type=1400 audit(1719918915.952:1312): avc: denied { watch } for pid=5637 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.4023250919/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c977 tclass=file permissive=0 Jul 2 11:15:15.952000 audit[5637]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001174080 a2=fc6 a3=0 items=0 ppid=5526 pid=5637 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 key=(null) Jul 2 11:15:16.198227 kernel: audit: type=1300 audit(1719918915.952:1312): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001174080 a2=fc6 a3=0 items=0 ppid=5526 pid=5637 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 key=(null) Jul 2 11:15:16.198306 kernel: audit: type=1327 audit(1719918915.952:1312): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:15:15.952000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:15:16.293558 kernel: audit: type=1400 audit(1719918916.230:1313): avc: denied { watch } for pid=5686 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.1092965845/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c783,c908 tclass=file permissive=0 Jul 2 11:15:16.230000 audit[5686]: AVC avc: denied { watch } for pid=5686 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.1092965845/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c783,c908 tclass=file permissive=0 Jul 2 11:15:16.389268 kernel: audit: type=1300 audit(1719918916.230:1313): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018b6000 a2=fc6 a3=0 items=0 ppid=5560 pid=5686 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 key=(null) Jul 2 11:15:16.230000 audit[5686]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018b6000 a2=fc6 a3=0 items=0 ppid=5560 pid=5686 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 key=(null) Jul 2 11:15:16.509929 kernel: audit: type=1327 audit(1719918916.230:1313): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:15:16.230000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:16:04.084000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:16:04.084000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:16:04.268965 kernel: audit: type=1400 audit(1719918964.084:1314): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:16:04.269010 kernel: audit: type=1400 audit(1719918964.084:1315): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:16:04.269027 kernel: audit: type=1300 audit(1719918964.084:1314): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007589260 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:16:04.084000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007589260 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:16:04.367233 kernel: audit: type=1327 audit(1719918964.084:1314): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:16:04.084000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:16:04.460296 kernel: audit: type=1300 audit(1719918964.084:1315): arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0107084e0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:16:04.084000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0107084e0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:16:04.558653 kernel: audit: type=1327 audit(1719918964.084:1315): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:16:04.084000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:16:04.651824 kernel: audit: type=1400 audit(1719918964.084:1316): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:16:04.084000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:16:04.741677 kernel: audit: type=1300 audit(1719918964.084:1316): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00a52df00 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:16:04.084000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00a52df00 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:16:04.840143 kernel: audit: type=1327 audit(1719918964.084:1316): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:16:04.084000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:16:04.933719 kernel: audit: type=1400 audit(1719918964.084:1317): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:16:04.084000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:16:04.084000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:16:04.084000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006381f40 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:16:04.084000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0057ba9f0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:16:04.084000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:16:04.084000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:16:04.084000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:16:04.084000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c000078690 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:16:04.084000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:16:04.170000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:16:04.170000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0022e4ea0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:16:04.170000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:16:04.170000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:16:04.170000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002987950 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:16:04.170000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:16:07.327000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:16:07.327000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d127e0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:16:07.327000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:16:07.327000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:16:07.327000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f93260 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:16:07.327000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:16:07.327000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:16:07.327000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c0022e4ec0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:16:07.327000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:16:07.327000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:16:07.327000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f48000 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:16:07.327000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:16:08.077506 update_engine[1548]: I0702 11:16:08.077420 1548 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Jul 2 11:16:08.077506 update_engine[1548]: I0702 11:16:08.077476 1548 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Jul 2 11:16:08.079234 update_engine[1548]: I0702 11:16:08.079164 1548 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Jul 2 11:16:08.079900 update_engine[1548]: I0702 11:16:08.079830 1548 omaha_request_params.cc:62] Current group set to lts Jul 2 11:16:08.080054 update_engine[1548]: I0702 11:16:08.080030 1548 update_attempter.cc:499] Already updated boot flags. Skipping. Jul 2 11:16:08.080054 update_engine[1548]: I0702 11:16:08.080044 1548 update_attempter.cc:643] Scheduling an action processor start. Jul 2 11:16:08.080235 update_engine[1548]: I0702 11:16:08.080067 1548 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jul 2 11:16:08.080235 update_engine[1548]: I0702 11:16:08.080121 1548 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Jul 2 11:16:08.080235 update_engine[1548]: I0702 11:16:08.080220 1548 omaha_request_action.cc:270] Posting an Omaha request to disabled Jul 2 11:16:08.080235 update_engine[1548]: I0702 11:16:08.080231 1548 omaha_request_action.cc:271] Request: Jul 2 11:16:08.080235 update_engine[1548]: Jul 2 11:16:08.080235 update_engine[1548]: Jul 2 11:16:08.080235 update_engine[1548]: Jul 2 11:16:08.080235 update_engine[1548]: Jul 2 11:16:08.080235 update_engine[1548]: Jul 2 11:16:08.080235 update_engine[1548]: Jul 2 11:16:08.080235 update_engine[1548]: Jul 2 11:16:08.080235 update_engine[1548]: Jul 2 11:16:08.080235 update_engine[1548]: I0702 11:16:08.080240 1548 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 11:16:08.081150 locksmithd[1587]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Jul 2 11:16:08.082757 update_engine[1548]: I0702 11:16:08.082697 1548 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 11:16:08.082944 update_engine[1548]: E0702 11:16:08.082893 1548 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 11:16:08.083049 update_engine[1548]: I0702 11:16:08.083027 1548 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Jul 2 11:16:15.953000 audit[5637]: AVC avc: denied { watch } for pid=5637 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.4023250919/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c977 tclass=file permissive=0 Jul 2 11:16:15.981483 kernel: kauditd_printk_skb: 26 callbacks suppressed Jul 2 11:16:15.981541 kernel: audit: type=1400 audit(1719918975.953:1326): avc: denied { watch } for pid=5637 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.4023250919/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c977 tclass=file permissive=0 Jul 2 11:16:15.953000 audit[5637]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001174120 a2=fc6 a3=0 items=0 ppid=5526 pid=5637 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 key=(null) Jul 2 11:16:16.200722 kernel: audit: type=1300 audit(1719918975.953:1326): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001174120 a2=fc6 a3=0 items=0 ppid=5526 pid=5637 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 key=(null) Jul 2 11:16:16.200762 kernel: audit: type=1327 audit(1719918975.953:1326): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:16:15.953000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:16:16.295899 kernel: audit: type=1400 audit(1719918976.230:1327): avc: denied { watch } for pid=5686 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.1092965845/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c783,c908 tclass=file permissive=0 Jul 2 11:16:16.230000 audit[5686]: AVC avc: denied { watch } for pid=5686 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.1092965845/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c783,c908 tclass=file permissive=0 Jul 2 11:16:16.391749 kernel: audit: type=1300 audit(1719918976.230:1327): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001e341c0 a2=fc6 a3=0 items=0 ppid=5560 pid=5686 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 key=(null) Jul 2 11:16:16.230000 audit[5686]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001e341c0 a2=fc6 a3=0 items=0 ppid=5560 pid=5686 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 key=(null) Jul 2 11:16:16.512454 kernel: audit: type=1327 audit(1719918976.230:1327): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:16:16.230000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:16:17.986171 update_engine[1548]: I0702 11:16:17.986049 1548 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 11:16:17.987080 update_engine[1548]: I0702 11:16:17.986582 1548 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 11:16:17.987080 update_engine[1548]: E0702 11:16:17.986789 1548 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 11:16:17.987080 update_engine[1548]: I0702 11:16:17.986964 1548 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Jul 2 11:16:27.984403 update_engine[1548]: I0702 11:16:27.984292 1548 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 11:16:27.985348 update_engine[1548]: I0702 11:16:27.984791 1548 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 11:16:27.985348 update_engine[1548]: E0702 11:16:27.984993 1548 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 11:16:27.985348 update_engine[1548]: I0702 11:16:27.985165 1548 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Jul 2 11:16:37.989518 update_engine[1548]: I0702 11:16:37.989324 1548 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 11:16:37.990478 update_engine[1548]: I0702 11:16:37.989840 1548 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 11:16:37.990478 update_engine[1548]: E0702 11:16:37.990072 1548 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 11:16:37.990478 update_engine[1548]: I0702 11:16:37.990227 1548 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Jul 2 11:16:37.990478 update_engine[1548]: I0702 11:16:37.990244 1548 omaha_request_action.cc:621] Omaha request response: Jul 2 11:16:37.990478 update_engine[1548]: E0702 11:16:37.990437 1548 omaha_request_action.cc:640] Omaha request network transfer failed. Jul 2 11:16:37.990478 update_engine[1548]: I0702 11:16:37.990465 1548 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Jul 2 11:16:37.990478 update_engine[1548]: I0702 11:16:37.990475 1548 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 11:16:37.990478 update_engine[1548]: I0702 11:16:37.990484 1548 update_attempter.cc:306] Processing Done. Jul 2 11:16:37.991420 update_engine[1548]: E0702 11:16:37.990514 1548 update_attempter.cc:619] Update failed. Jul 2 11:16:37.991420 update_engine[1548]: I0702 11:16:37.990522 1548 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Jul 2 11:16:37.991420 update_engine[1548]: I0702 11:16:37.990532 1548 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Jul 2 11:16:37.991420 update_engine[1548]: I0702 11:16:37.990542 1548 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Jul 2 11:16:37.991420 update_engine[1548]: I0702 11:16:37.990693 1548 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Jul 2 11:16:37.991420 update_engine[1548]: I0702 11:16:37.990744 1548 omaha_request_action.cc:270] Posting an Omaha request to disabled Jul 2 11:16:37.991420 update_engine[1548]: I0702 11:16:37.990754 1548 omaha_request_action.cc:271] Request: Jul 2 11:16:37.991420 update_engine[1548]: Jul 2 11:16:37.991420 update_engine[1548]: Jul 2 11:16:37.991420 update_engine[1548]: Jul 2 11:16:37.991420 update_engine[1548]: Jul 2 11:16:37.991420 update_engine[1548]: Jul 2 11:16:37.991420 update_engine[1548]: Jul 2 11:16:37.991420 update_engine[1548]: I0702 11:16:37.990764 1548 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Jul 2 11:16:37.991420 update_engine[1548]: I0702 11:16:37.991115 1548 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Jul 2 11:16:37.991420 update_engine[1548]: E0702 11:16:37.991302 1548 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Jul 2 11:16:37.992890 locksmithd[1587]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Jul 2 11:16:37.992890 locksmithd[1587]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Jul 2 11:16:37.993591 update_engine[1548]: I0702 11:16:37.991441 1548 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Jul 2 11:16:37.993591 update_engine[1548]: I0702 11:16:37.991456 1548 omaha_request_action.cc:621] Omaha request response: Jul 2 11:16:37.993591 update_engine[1548]: I0702 11:16:37.991467 1548 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 11:16:37.993591 update_engine[1548]: I0702 11:16:37.991475 1548 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Jul 2 11:16:37.993591 update_engine[1548]: I0702 11:16:37.991483 1548 update_attempter.cc:306] Processing Done. Jul 2 11:16:37.993591 update_engine[1548]: I0702 11:16:37.991492 1548 update_attempter.cc:310] Error event sent. Jul 2 11:16:37.993591 update_engine[1548]: I0702 11:16:37.991513 1548 update_check_scheduler.cc:74] Next update check in 48m7s Jul 2 11:17:04.085000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:17:04.085000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0090fce10 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:17:04.278332 kernel: audit: type=1400 audit(1719919024.085:1328): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:17:04.278387 kernel: audit: type=1300 audit(1719919024.085:1328): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0090fce10 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:17:04.278404 kernel: audit: type=1327 audit(1719919024.085:1328): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:17:04.085000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:17:04.371566 kernel: audit: type=1400 audit(1719919024.085:1329): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:17:04.085000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:17:04.462040 kernel: audit: type=1300 audit(1719919024.085:1329): arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00f63fe00 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:17:04.085000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00f63fe00 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:17:04.560451 kernel: audit: type=1327 audit(1719919024.085:1329): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:17:04.085000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:17:04.085000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:17:04.744352 kernel: audit: type=1400 audit(1719919024.085:1330): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:17:04.744383 kernel: audit: type=1300 audit(1719919024.085:1330): arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00d751040 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:17:04.085000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c00d751040 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:17:04.843354 kernel: audit: type=1327 audit(1719919024.085:1330): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:17:04.085000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:17:04.938272 kernel: audit: type=1400 audit(1719919024.085:1331): avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:17:04.085000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:17:04.085000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:17:04.085000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0090fce40 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:17:04.085000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c00f63fe90 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:17:04.085000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:17:04.085000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:17:04.085000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:17:04.085000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c008390000 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:17:04.085000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:17:04.171000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:17:04.171000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002b0e0f0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:17:04.171000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:17:04.171000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:17:04.171000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ecb9c0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:17:04.171000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:17:07.328000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:17:07.328000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0036621c0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:17:07.328000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:17:07.328000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:17:07.328000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ecbb00 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:17:07.328000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:17:07.328000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:17:07.328000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:17:07.328000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0036621e0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:17:07.328000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:17:07.328000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f48040 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:17:07.328000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:17:15.953000 audit[5637]: AVC avc: denied { watch } for pid=5637 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.4023250919/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c977 tclass=file permissive=0 Jul 2 11:17:15.983213 kernel: kauditd_printk_skb: 26 callbacks suppressed Jul 2 11:17:15.983340 kernel: audit: type=1400 audit(1719919035.953:1340): avc: denied { watch } for pid=5637 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.4023250919/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c977 tclass=file permissive=0 Jul 2 11:17:15.953000 audit[5637]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00156e980 a2=fc6 a3=0 items=0 ppid=5526 pid=5637 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 key=(null) Jul 2 11:17:16.200460 kernel: audit: type=1300 audit(1719919035.953:1340): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00156e980 a2=fc6 a3=0 items=0 ppid=5526 pid=5637 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 key=(null) Jul 2 11:17:16.200524 kernel: audit: type=1327 audit(1719919035.953:1340): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:17:15.953000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:17:16.230000 audit[5686]: AVC avc: denied { watch } for pid=5686 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.1092965845/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c783,c908 tclass=file permissive=0 Jul 2 11:17:16.388327 kernel: audit: type=1400 audit(1719919036.230:1341): avc: denied { watch } for pid=5686 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.1092965845/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c783,c908 tclass=file permissive=0 Jul 2 11:17:16.388386 kernel: audit: type=1300 audit(1719919036.230:1341): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001632560 a2=fc6 a3=0 items=0 ppid=5560 pid=5686 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 key=(null) Jul 2 11:17:16.230000 audit[5686]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001632560 a2=fc6 a3=0 items=0 ppid=5560 pid=5686 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 key=(null) Jul 2 11:17:16.230000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:17:16.602430 kernel: audit: type=1327 audit(1719919036.230:1341): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:17:34.114831 systemd[1]: Started sshd@9-147.75.203.5:22-139.178.68.195:43482.service. Jul 2 11:17:34.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.203.5:22-139.178.68.195:43482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:34.205275 kernel: audit: type=1130 audit(1719919054.114:1342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.203.5:22-139.178.68.195:43482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:34.230778 sshd[6607]: Accepted publickey for core from 139.178.68.195 port 43482 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:17:34.230000 audit[6607]: USER_ACCT pid=6607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:34.232545 sshd[6607]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:17:34.234942 systemd-logind[1589]: New session 10 of user core. Jul 2 11:17:34.236637 systemd[1]: Started session-10.scope. Jul 2 11:17:34.317195 sshd[6607]: pam_unix(sshd:session): session closed for user core Jul 2 11:17:34.318695 systemd[1]: sshd@9-147.75.203.5:22-139.178.68.195:43482.service: Deactivated successfully. Jul 2 11:17:34.319150 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 11:17:34.319510 systemd-logind[1589]: Session 10 logged out. Waiting for processes to exit. Jul 2 11:17:34.319991 systemd-logind[1589]: Removed session 10. Jul 2 11:17:34.232000 audit[6607]: CRED_ACQ pid=6607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:34.324342 kernel: audit: type=1101 audit(1719919054.230:1343): pid=6607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:34.324376 kernel: audit: type=1103 audit(1719919054.232:1344): pid=6607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:34.473796 kernel: audit: type=1006 audit(1719919054.232:1345): pid=6607 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Jul 2 11:17:34.473833 kernel: audit: type=1300 audit(1719919054.232:1345): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc00327e60 a2=3 a3=0 items=0 ppid=1 pid=6607 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:17:34.232000 audit[6607]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc00327e60 a2=3 a3=0 items=0 ppid=1 pid=6607 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:17:34.566597 kernel: audit: type=1327 audit(1719919054.232:1345): proctitle=737368643A20636F7265205B707269765D Jul 2 11:17:34.232000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:17:34.597401 kernel: audit: type=1105 audit(1719919054.238:1346): pid=6607 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:34.238000 audit[6607]: USER_START pid=6607 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:34.692753 kernel: audit: type=1103 audit(1719919054.238:1347): pid=6609 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:34.238000 audit[6609]: CRED_ACQ pid=6609 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:34.782029 kernel: audit: type=1106 audit(1719919054.317:1348): pid=6607 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:34.317000 audit[6607]: USER_END pid=6607 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:34.877626 kernel: audit: type=1104 audit(1719919054.317:1349): pid=6607 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:34.317000 audit[6607]: CRED_DISP pid=6607 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:34.318000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-147.75.203.5:22-139.178.68.195:43482 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:39.328838 systemd[1]: Started sshd@10-147.75.203.5:22-139.178.68.195:43488.service. Jul 2 11:17:39.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.203.5:22-139.178.68.195:43488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:39.356853 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 11:17:39.356889 kernel: audit: type=1130 audit(1719919059.329:1351): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.203.5:22-139.178.68.195:43488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:39.473000 audit[6665]: USER_ACCT pid=6665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:39.473784 sshd[6665]: Accepted publickey for core from 139.178.68.195 port 43488 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:17:39.474941 sshd[6665]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:17:39.477316 systemd-logind[1589]: New session 11 of user core. Jul 2 11:17:39.477817 systemd[1]: Started session-11.scope. Jul 2 11:17:39.554280 sshd[6665]: pam_unix(sshd:session): session closed for user core Jul 2 11:17:39.555775 systemd[1]: sshd@10-147.75.203.5:22-139.178.68.195:43488.service: Deactivated successfully. Jul 2 11:17:39.556212 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 11:17:39.556628 systemd-logind[1589]: Session 11 logged out. Waiting for processes to exit. Jul 2 11:17:39.557127 systemd-logind[1589]: Removed session 11. Jul 2 11:17:39.474000 audit[6665]: CRED_ACQ pid=6665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:39.657170 kernel: audit: type=1101 audit(1719919059.473:1352): pid=6665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:39.657218 kernel: audit: type=1103 audit(1719919059.474:1353): pid=6665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:39.657235 kernel: audit: type=1006 audit(1719919059.474:1354): pid=6665 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Jul 2 11:17:39.716236 kernel: audit: type=1300 audit(1719919059.474:1354): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb63197b0 a2=3 a3=0 items=0 ppid=1 pid=6665 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:17:39.474000 audit[6665]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb63197b0 a2=3 a3=0 items=0 ppid=1 pid=6665 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:17:39.808934 kernel: audit: type=1327 audit(1719919059.474:1354): proctitle=737368643A20636F7265205B707269765D Jul 2 11:17:39.474000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:17:39.839676 kernel: audit: type=1105 audit(1719919059.479:1355): pid=6665 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:39.479000 audit[6665]: USER_START pid=6665 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:39.934967 kernel: audit: type=1103 audit(1719919059.480:1356): pid=6667 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:39.480000 audit[6667]: CRED_ACQ pid=6667 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:40.024344 kernel: audit: type=1106 audit(1719919059.554:1357): pid=6665 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:39.554000 audit[6665]: USER_END pid=6665 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:40.119898 kernel: audit: type=1104 audit(1719919059.554:1358): pid=6665 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:39.554000 audit[6665]: CRED_DISP pid=6665 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:39.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-147.75.203.5:22-139.178.68.195:43488 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:44.566463 systemd[1]: Started sshd@11-147.75.203.5:22-139.178.68.195:40812.service. Jul 2 11:17:44.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.203.5:22-139.178.68.195:40812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:44.594012 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 11:17:44.594062 kernel: audit: type=1130 audit(1719919064.565:1360): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.203.5:22-139.178.68.195:40812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:44.709000 audit[6693]: USER_ACCT pid=6693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:44.709754 sshd[6693]: Accepted publickey for core from 139.178.68.195 port 40812 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:17:44.710575 sshd[6693]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:17:44.712984 systemd-logind[1589]: New session 12 of user core. Jul 2 11:17:44.713400 systemd[1]: Started session-12.scope. Jul 2 11:17:44.793658 sshd[6693]: pam_unix(sshd:session): session closed for user core Jul 2 11:17:44.795552 systemd[1]: sshd@11-147.75.203.5:22-139.178.68.195:40812.service: Deactivated successfully. Jul 2 11:17:44.795889 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 11:17:44.796197 systemd-logind[1589]: Session 12 logged out. Waiting for processes to exit. Jul 2 11:17:44.796787 systemd[1]: Started sshd@12-147.75.203.5:22-139.178.68.195:40826.service. Jul 2 11:17:44.797207 systemd-logind[1589]: Removed session 12. Jul 2 11:17:44.709000 audit[6693]: CRED_ACQ pid=6693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:44.891808 kernel: audit: type=1101 audit(1719919064.709:1361): pid=6693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:44.891848 kernel: audit: type=1103 audit(1719919064.709:1362): pid=6693 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:44.891866 kernel: audit: type=1006 audit(1719919064.709:1363): pid=6693 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Jul 2 11:17:44.950643 kernel: audit: type=1300 audit(1719919064.709:1363): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd18f9ed10 a2=3 a3=0 items=0 ppid=1 pid=6693 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:17:44.709000 audit[6693]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd18f9ed10 a2=3 a3=0 items=0 ppid=1 pid=6693 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:17:44.976410 sshd[6718]: Accepted publickey for core from 139.178.68.195 port 40826 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:17:44.977908 sshd[6718]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:17:44.980217 systemd-logind[1589]: New session 13 of user core. Jul 2 11:17:44.980726 systemd[1]: Started session-13.scope. Jul 2 11:17:44.709000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:17:45.073544 kernel: audit: type=1327 audit(1719919064.709:1363): proctitle=737368643A20636F7265205B707269765D Jul 2 11:17:45.073619 kernel: audit: type=1105 audit(1719919064.714:1364): pid=6693 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:44.714000 audit[6693]: USER_START pid=6693 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:45.076974 sshd[6718]: pam_unix(sshd:session): session closed for user core Jul 2 11:17:45.078852 systemd[1]: sshd@12-147.75.203.5:22-139.178.68.195:40826.service: Deactivated successfully. Jul 2 11:17:45.079202 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 11:17:45.079573 systemd-logind[1589]: Session 13 logged out. Waiting for processes to exit. Jul 2 11:17:45.080281 systemd[1]: Started sshd@13-147.75.203.5:22-139.178.68.195:40830.service. Jul 2 11:17:45.080806 systemd-logind[1589]: Removed session 13. Jul 2 11:17:44.714000 audit[6695]: CRED_ACQ pid=6695 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:45.257447 kernel: audit: type=1103 audit(1719919064.714:1365): pid=6695 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:45.257502 kernel: audit: type=1106 audit(1719919064.792:1366): pid=6693 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:44.792000 audit[6693]: USER_END pid=6693 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:45.283287 sshd[6741]: Accepted publickey for core from 139.178.68.195 port 40830 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:17:45.284577 sshd[6741]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:17:45.286807 systemd-logind[1589]: New session 14 of user core. Jul 2 11:17:45.287309 systemd[1]: Started session-14.scope. Jul 2 11:17:44.793000 audit[6693]: CRED_DISP pid=6693 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:45.365282 sshd[6741]: pam_unix(sshd:session): session closed for user core Jul 2 11:17:45.366663 systemd[1]: sshd@13-147.75.203.5:22-139.178.68.195:40830.service: Deactivated successfully. Jul 2 11:17:45.367094 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 11:17:45.367522 systemd-logind[1589]: Session 14 logged out. Waiting for processes to exit. Jul 2 11:17:45.368080 systemd-logind[1589]: Removed session 14. Jul 2 11:17:45.442432 kernel: audit: type=1104 audit(1719919064.793:1367): pid=6693 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:44.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-147.75.203.5:22-139.178.68.195:40812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:44.795000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.203.5:22-139.178.68.195:40826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:44.975000 audit[6718]: USER_ACCT pid=6718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:44.976000 audit[6718]: CRED_ACQ pid=6718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:44.976000 audit[6718]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe56740270 a2=3 a3=0 items=0 ppid=1 pid=6718 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:17:44.976000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:17:44.981000 audit[6718]: USER_START pid=6718 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:44.981000 audit[6720]: CRED_ACQ pid=6720 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:45.076000 audit[6718]: USER_END pid=6718 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:45.076000 audit[6718]: CRED_DISP pid=6718 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:45.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-147.75.203.5:22-139.178.68.195:40826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:45.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.203.5:22-139.178.68.195:40830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:45.281000 audit[6741]: USER_ACCT pid=6741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:45.283000 audit[6741]: CRED_ACQ pid=6741 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:45.283000 audit[6741]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8bd72d20 a2=3 a3=0 items=0 ppid=1 pid=6741 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:17:45.283000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:17:45.288000 audit[6741]: USER_START pid=6741 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:45.288000 audit[6744]: CRED_ACQ pid=6744 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:45.364000 audit[6741]: USER_END pid=6741 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:45.364000 audit[6741]: CRED_DISP pid=6741 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:45.365000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-147.75.203.5:22-139.178.68.195:40830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:50.377335 systemd[1]: Started sshd@14-147.75.203.5:22-139.178.68.195:40840.service. Jul 2 11:17:50.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.203.5:22-139.178.68.195:40840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:50.404282 kernel: kauditd_printk_skb: 23 callbacks suppressed Jul 2 11:17:50.404330 kernel: audit: type=1130 audit(1719919070.376:1387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.203.5:22-139.178.68.195:40840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:50.519000 audit[6774]: USER_ACCT pid=6774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:50.520819 sshd[6774]: Accepted publickey for core from 139.178.68.195 port 40840 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:17:50.524833 sshd[6774]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:17:50.535783 systemd-logind[1589]: New session 15 of user core. Jul 2 11:17:50.537981 systemd[1]: Started session-15.scope. Jul 2 11:17:50.522000 audit[6774]: CRED_ACQ pid=6774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:50.623463 sshd[6774]: pam_unix(sshd:session): session closed for user core Jul 2 11:17:50.624709 systemd[1]: sshd@14-147.75.203.5:22-139.178.68.195:40840.service: Deactivated successfully. Jul 2 11:17:50.625137 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 11:17:50.625475 systemd-logind[1589]: Session 15 logged out. Waiting for processes to exit. Jul 2 11:17:50.625861 systemd-logind[1589]: Removed session 15. Jul 2 11:17:50.702454 kernel: audit: type=1101 audit(1719919070.519:1388): pid=6774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:50.702496 kernel: audit: type=1103 audit(1719919070.522:1389): pid=6774 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:50.702516 kernel: audit: type=1006 audit(1719919070.522:1390): pid=6774 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Jul 2 11:17:50.761183 kernel: audit: type=1300 audit(1719919070.522:1390): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffccbea3d50 a2=3 a3=0 items=0 ppid=1 pid=6774 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:17:50.522000 audit[6774]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffccbea3d50 a2=3 a3=0 items=0 ppid=1 pid=6774 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:17:50.853219 kernel: audit: type=1327 audit(1719919070.522:1390): proctitle=737368643A20636F7265205B707269765D Jul 2 11:17:50.522000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:17:50.883772 kernel: audit: type=1105 audit(1719919070.545:1391): pid=6774 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:50.545000 audit[6774]: USER_START pid=6774 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:50.546000 audit[6776]: CRED_ACQ pid=6776 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:51.067569 kernel: audit: type=1103 audit(1719919070.546:1392): pid=6776 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:51.067606 kernel: audit: type=1106 audit(1719919070.622:1393): pid=6774 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:50.622000 audit[6774]: USER_END pid=6774 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:51.163145 kernel: audit: type=1104 audit(1719919070.622:1394): pid=6774 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:50.622000 audit[6774]: CRED_DISP pid=6774 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:50.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-147.75.203.5:22-139.178.68.195:40840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:55.632894 systemd[1]: Started sshd@15-147.75.203.5:22-139.178.68.195:60754.service. Jul 2 11:17:55.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.203.5:22-139.178.68.195:60754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:55.659767 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 11:17:55.659831 kernel: audit: type=1130 audit(1719919075.631:1396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.203.5:22-139.178.68.195:60754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:17:55.772000 audit[6852]: USER_ACCT pid=6852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:55.774246 sshd[6852]: Accepted publickey for core from 139.178.68.195 port 60754 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:17:55.802849 sshd[6852]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:17:55.805729 systemd-logind[1589]: New session 16 of user core. Jul 2 11:17:55.806322 systemd[1]: Started session-16.scope. Jul 2 11:17:55.801000 audit[6852]: CRED_ACQ pid=6852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:55.885641 sshd[6852]: pam_unix(sshd:session): session closed for user core Jul 2 11:17:55.887037 systemd[1]: sshd@15-147.75.203.5:22-139.178.68.195:60754.service: Deactivated successfully. Jul 2 11:17:55.887476 systemd[1]: session-16.scope: Deactivated successfully. Jul 2 11:17:55.887835 systemd-logind[1589]: Session 16 logged out. Waiting for processes to exit. Jul 2 11:17:55.888225 systemd-logind[1589]: Removed session 16. Jul 2 11:17:55.958660 kernel: audit: type=1101 audit(1719919075.772:1397): pid=6852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:55.958700 kernel: audit: type=1103 audit(1719919075.801:1398): pid=6852 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:55.958718 kernel: audit: type=1006 audit(1719919075.801:1399): pid=6852 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Jul 2 11:17:56.017303 kernel: audit: type=1300 audit(1719919075.801:1399): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe272bfe70 a2=3 a3=0 items=0 ppid=1 pid=6852 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:17:55.801000 audit[6852]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe272bfe70 a2=3 a3=0 items=0 ppid=1 pid=6852 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:17:55.801000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:17:56.139923 kernel: audit: type=1327 audit(1719919075.801:1399): proctitle=737368643A20636F7265205B707269765D Jul 2 11:17:56.139963 kernel: audit: type=1105 audit(1719919075.807:1400): pid=6852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:55.807000 audit[6852]: USER_START pid=6852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:56.234529 kernel: audit: type=1103 audit(1719919075.807:1401): pid=6854 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:55.807000 audit[6854]: CRED_ACQ pid=6854 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:56.323770 kernel: audit: type=1106 audit(1719919075.885:1402): pid=6852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:55.885000 audit[6852]: USER_END pid=6852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:56.419344 kernel: audit: type=1104 audit(1719919075.885:1403): pid=6852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:55.885000 audit[6852]: CRED_DISP pid=6852 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:17:55.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-147.75.203.5:22-139.178.68.195:60754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:00.895561 systemd[1]: Started sshd@16-147.75.203.5:22-139.178.68.195:60768.service. Jul 2 11:18:00.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.203.5:22-139.178.68.195:60768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:00.922699 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 11:18:00.922756 kernel: audit: type=1130 audit(1719919080.894:1405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.203.5:22-139.178.68.195:60768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:01.036000 audit[6896]: USER_ACCT pid=6896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:01.037872 sshd[6896]: Accepted publickey for core from 139.178.68.195 port 60768 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:18:01.039196 sshd[6896]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:18:01.042115 systemd-logind[1589]: New session 17 of user core. Jul 2 11:18:01.042999 systemd[1]: Started session-17.scope. Jul 2 11:18:01.122261 sshd[6896]: pam_unix(sshd:session): session closed for user core Jul 2 11:18:01.123923 systemd[1]: sshd@16-147.75.203.5:22-139.178.68.195:60768.service: Deactivated successfully. Jul 2 11:18:01.124754 systemd[1]: session-17.scope: Deactivated successfully. Jul 2 11:18:01.125268 systemd-logind[1589]: Session 17 logged out. Waiting for processes to exit. Jul 2 11:18:01.125840 systemd-logind[1589]: Removed session 17. Jul 2 11:18:01.037000 audit[6896]: CRED_ACQ pid=6896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:01.219611 kernel: audit: type=1101 audit(1719919081.036:1406): pid=6896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:01.219664 kernel: audit: type=1103 audit(1719919081.037:1407): pid=6896 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:01.219682 kernel: audit: type=1006 audit(1719919081.037:1408): pid=6896 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Jul 2 11:18:01.278240 kernel: audit: type=1300 audit(1719919081.037:1408): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeb7534c0 a2=3 a3=0 items=0 ppid=1 pid=6896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:01.037000 audit[6896]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeb7534c0 a2=3 a3=0 items=0 ppid=1 pid=6896 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:01.037000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:01.400810 kernel: audit: type=1327 audit(1719919081.037:1408): proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:01.400862 kernel: audit: type=1105 audit(1719919081.044:1409): pid=6896 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:01.044000 audit[6896]: USER_START pid=6896 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:01.044000 audit[6898]: CRED_ACQ pid=6898 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:01.584645 kernel: audit: type=1103 audit(1719919081.044:1410): pid=6898 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:01.584682 kernel: audit: type=1106 audit(1719919081.121:1411): pid=6896 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:01.121000 audit[6896]: USER_END pid=6896 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:01.680130 kernel: audit: type=1104 audit(1719919081.121:1412): pid=6896 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:01.121000 audit[6896]: CRED_DISP pid=6896 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:01.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-147.75.203.5:22-139.178.68.195:60768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:04.086000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:18:04.086000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c005e57020 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:18:04.086000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:18:04.086000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8235 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:18:04.086000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c00f225e00 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:18:04.086000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:18:04.086000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:18:04.086000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c0110c4ca0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:18:04.086000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:18:04.086000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:18:04.086000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8241 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:18:04.086000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0087a0990 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:18:04.086000 audit[2422]: AVC avc: denied { watch } for pid=2422 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:18:04.086000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:18:04.086000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c009ce6f00 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:18:04.086000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:18:04.086000 audit[2422]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c010ad8ea0 a2=fc6 a3=0 items=0 ppid=2277 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c366,c874 key=(null) Jul 2 11:18:04.086000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3134372E37352E3230332E35002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Jul 2 11:18:04.171000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8239 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:18:04.171000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010750b0 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:18:04.171000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:18:04.171000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:18:04.171000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d12320 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:18:04.171000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:18:06.127708 systemd[1]: Started sshd@17-147.75.203.5:22-139.178.68.195:56922.service. Jul 2 11:18:06.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.203.5:22-139.178.68.195:56922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:06.154873 kernel: kauditd_printk_skb: 25 callbacks suppressed Jul 2 11:18:06.154956 kernel: audit: type=1130 audit(1719919086.126:1422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.203.5:22-139.178.68.195:56922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:06.269000 audit[6921]: USER_ACCT pid=6921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:06.270526 sshd[6921]: Accepted publickey for core from 139.178.68.195 port 56922 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:18:06.271244 sshd[6921]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:18:06.273539 systemd-logind[1589]: New session 18 of user core. Jul 2 11:18:06.274009 systemd[1]: Started session-18.scope. Jul 2 11:18:06.269000 audit[6921]: CRED_ACQ pid=6921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:06.452330 kernel: audit: type=1101 audit(1719919086.269:1423): pid=6921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:06.452409 kernel: audit: type=1103 audit(1719919086.269:1424): pid=6921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:06.452431 kernel: audit: type=1006 audit(1719919086.269:1425): pid=6921 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Jul 2 11:18:06.455114 sshd[6921]: pam_unix(sshd:session): session closed for user core Jul 2 11:18:06.456571 systemd[1]: sshd@17-147.75.203.5:22-139.178.68.195:56922.service: Deactivated successfully. Jul 2 11:18:06.457010 systemd[1]: session-18.scope: Deactivated successfully. Jul 2 11:18:06.457303 systemd-logind[1589]: Session 18 logged out. Waiting for processes to exit. Jul 2 11:18:06.457893 systemd-logind[1589]: Removed session 18. Jul 2 11:18:06.269000 audit[6921]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc9df0140 a2=3 a3=0 items=0 ppid=1 pid=6921 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:06.602948 kernel: audit: type=1300 audit(1719919086.269:1425): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc9df0140 a2=3 a3=0 items=0 ppid=1 pid=6921 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:06.603016 kernel: audit: type=1327 audit(1719919086.269:1425): proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:06.269000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:06.633491 kernel: audit: type=1105 audit(1719919086.283:1426): pid=6921 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:06.283000 audit[6921]: USER_START pid=6921 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:06.284000 audit[6923]: CRED_ACQ pid=6923 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:06.728314 kernel: audit: type=1103 audit(1719919086.284:1427): pid=6923 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:06.454000 audit[6921]: USER_END pid=6921 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:06.912825 kernel: audit: type=1106 audit(1719919086.454:1428): pid=6921 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:06.912878 kernel: audit: type=1104 audit(1719919086.454:1429): pid=6921 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:06.454000 audit[6921]: CRED_DISP pid=6921 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:06.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-147.75.203.5:22-139.178.68.195:56922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:07.329000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:18:07.329000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003921b20 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:18:07.329000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:18:07.329000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:18:07.329000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002982500 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:18:07.329000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:18:07.329000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:18:07.329000 audit[2424]: AVC avc: denied { watch } for pid=2424 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8233 scontext=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 11:18:07.329000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001053c80 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:18:07.329000 audit[2424]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000eca060 a2=fc6 a3=0 items=0 ppid=2274 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c45,c758 key=(null) Jul 2 11:18:07.329000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:18:07.329000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 11:18:11.464414 systemd[1]: Started sshd@18-147.75.203.5:22-139.178.68.195:56938.service. Jul 2 11:18:11.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.203.5:22-139.178.68.195:56938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:11.491451 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 2 11:18:11.491537 kernel: audit: type=1130 audit(1719919091.463:1435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.203.5:22-139.178.68.195:56938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:11.606000 audit[6971]: USER_ACCT pid=6971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:11.607874 sshd[6971]: Accepted publickey for core from 139.178.68.195 port 56938 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:18:11.611315 sshd[6971]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:18:11.615980 systemd-logind[1589]: New session 19 of user core. Jul 2 11:18:11.616454 systemd[1]: Started session-19.scope. Jul 2 11:18:11.694594 sshd[6971]: pam_unix(sshd:session): session closed for user core Jul 2 11:18:11.696642 systemd[1]: sshd@18-147.75.203.5:22-139.178.68.195:56938.service: Deactivated successfully. Jul 2 11:18:11.697031 systemd[1]: session-19.scope: Deactivated successfully. Jul 2 11:18:11.697399 systemd-logind[1589]: Session 19 logged out. Waiting for processes to exit. Jul 2 11:18:11.698035 systemd[1]: Started sshd@19-147.75.203.5:22-139.178.68.195:56946.service. Jul 2 11:18:11.698604 systemd-logind[1589]: Removed session 19. Jul 2 11:18:11.609000 audit[6971]: CRED_ACQ pid=6971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:11.789448 kernel: audit: type=1101 audit(1719919091.606:1436): pid=6971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:11.789499 kernel: audit: type=1103 audit(1719919091.609:1437): pid=6971 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:11.789517 kernel: audit: type=1006 audit(1719919091.609:1438): pid=6971 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Jul 2 11:18:11.847998 kernel: audit: type=1300 audit(1719919091.609:1438): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb52959a0 a2=3 a3=0 items=0 ppid=1 pid=6971 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:11.609000 audit[6971]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb52959a0 a2=3 a3=0 items=0 ppid=1 pid=6971 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:11.873725 sshd[6995]: Accepted publickey for core from 139.178.68.195 port 56946 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:18:11.874576 sshd[6995]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:18:11.877029 systemd-logind[1589]: New session 20 of user core. Jul 2 11:18:11.877521 systemd[1]: Started session-20.scope. Jul 2 11:18:11.940001 kernel: audit: type=1327 audit(1719919091.609:1438): proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:11.609000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:11.970517 kernel: audit: type=1105 audit(1719919091.617:1439): pid=6971 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:11.617000 audit[6971]: USER_START pid=6971 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:11.971604 sshd[6995]: pam_unix(sshd:session): session closed for user core Jul 2 11:18:11.974293 systemd[1]: sshd@19-147.75.203.5:22-139.178.68.195:56946.service: Deactivated successfully. Jul 2 11:18:11.974866 systemd[1]: session-20.scope: Deactivated successfully. Jul 2 11:18:11.975429 systemd-logind[1589]: Session 20 logged out. Waiting for processes to exit. Jul 2 11:18:11.976534 systemd[1]: Started sshd@20-147.75.203.5:22-139.178.68.195:56948.service. Jul 2 11:18:11.977175 systemd-logind[1589]: Removed session 20. Jul 2 11:18:11.618000 audit[6973]: CRED_ACQ pid=6973 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:12.065313 kernel: audit: type=1103 audit(1719919091.618:1440): pid=6973 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:11.694000 audit[6971]: USER_END pid=6971 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:12.249766 kernel: audit: type=1106 audit(1719919091.694:1441): pid=6971 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:11.694000 audit[6971]: CRED_DISP pid=6971 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:12.339172 kernel: audit: type=1104 audit(1719919091.694:1442): pid=6971 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:11.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-147.75.203.5:22-139.178.68.195:56938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:11.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.203.5:22-139.178.68.195:56946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:11.872000 audit[6995]: USER_ACCT pid=6995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:11.873000 audit[6995]: CRED_ACQ pid=6995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:11.873000 audit[6995]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8692d9d0 a2=3 a3=0 items=0 ppid=1 pid=6995 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:11.873000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:11.878000 audit[6995]: USER_START pid=6995 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:11.879000 audit[6997]: CRED_ACQ pid=6997 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:11.971000 audit[6995]: USER_END pid=6995 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:11.971000 audit[6995]: CRED_DISP pid=6995 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:11.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-147.75.203.5:22-139.178.68.195:56946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:11.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.203.5:22-139.178.68.195:56948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:12.360000 audit[7017]: USER_ACCT pid=7017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:12.361503 sshd[7017]: Accepted publickey for core from 139.178.68.195 port 56948 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:18:12.360000 audit[7017]: CRED_ACQ pid=7017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:12.360000 audit[7017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc95798a10 a2=3 a3=0 items=0 ppid=1 pid=7017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:12.360000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:12.362316 sshd[7017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:18:12.364829 systemd-logind[1589]: New session 21 of user core. Jul 2 11:18:12.365317 systemd[1]: Started session-21.scope. Jul 2 11:18:12.366000 audit[7017]: USER_START pid=7017 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:12.366000 audit[7021]: CRED_ACQ pid=7021 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:13.496000 audit[7044]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=7044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:18:13.496000 audit[7044]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcd341b400 a2=0 a3=7ffcd341b3ec items=0 ppid=2850 pid=7044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:13.496000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:18:13.503568 sshd[7017]: pam_unix(sshd:session): session closed for user core Jul 2 11:18:13.502000 audit[7017]: USER_END pid=7017 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:13.503000 audit[7017]: CRED_DISP pid=7017 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:13.505523 systemd[1]: sshd@20-147.75.203.5:22-139.178.68.195:56948.service: Deactivated successfully. Jul 2 11:18:13.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-147.75.203.5:22-139.178.68.195:56948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:13.506027 systemd[1]: session-21.scope: Deactivated successfully. Jul 2 11:18:13.506389 systemd-logind[1589]: Session 21 logged out. Waiting for processes to exit. Jul 2 11:18:13.496000 audit[7044]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=7044 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:18:13.496000 audit[7044]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcd341b400 a2=0 a3=0 items=0 ppid=2850 pid=7044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:13.496000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:18:13.507136 systemd[1]: Started sshd@21-147.75.203.5:22-139.178.68.195:46640.service. Jul 2 11:18:13.505000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.203.5:22-139.178.68.195:46640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:13.507627 systemd-logind[1589]: Removed session 21. Jul 2 11:18:13.509000 audit[7050]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=7050 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:18:13.509000 audit[7050]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe3d226d70 a2=0 a3=7ffe3d226d5c items=0 ppid=2850 pid=7050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:13.509000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:18:13.537000 audit[7049]: USER_ACCT pid=7049 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:13.539610 sshd[7049]: Accepted publickey for core from 139.178.68.195 port 46640 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:18:13.540000 audit[7049]: CRED_ACQ pid=7049 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:13.540000 audit[7049]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb5341c20 a2=3 a3=0 items=0 ppid=1 pid=7049 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:13.540000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:13.542881 sshd[7049]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:18:13.521000 audit[7050]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=7050 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:18:13.521000 audit[7050]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe3d226d70 a2=0 a3=0 items=0 ppid=2850 pid=7050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:13.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:18:13.553057 systemd-logind[1589]: New session 22 of user core. Jul 2 11:18:13.555509 systemd[1]: Started session-22.scope. Jul 2 11:18:13.569000 audit[7049]: USER_START pid=7049 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:13.572000 audit[7053]: CRED_ACQ pid=7053 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:13.770528 sshd[7049]: pam_unix(sshd:session): session closed for user core Jul 2 11:18:13.770000 audit[7049]: USER_END pid=7049 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:13.770000 audit[7049]: CRED_DISP pid=7049 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:13.772700 systemd[1]: sshd@21-147.75.203.5:22-139.178.68.195:46640.service: Deactivated successfully. Jul 2 11:18:13.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-147.75.203.5:22-139.178.68.195:46640 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:13.773156 systemd[1]: session-22.scope: Deactivated successfully. Jul 2 11:18:13.773600 systemd-logind[1589]: Session 22 logged out. Waiting for processes to exit. Jul 2 11:18:13.774322 systemd[1]: Started sshd@22-147.75.203.5:22-139.178.68.195:46654.service. Jul 2 11:18:13.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.203.5:22-139.178.68.195:46654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:13.774843 systemd-logind[1589]: Removed session 22. Jul 2 11:18:13.806000 audit[7074]: USER_ACCT pid=7074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:13.808189 sshd[7074]: Accepted publickey for core from 139.178.68.195 port 46654 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:18:13.807000 audit[7074]: CRED_ACQ pid=7074 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:13.807000 audit[7074]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff688c0880 a2=3 a3=0 items=0 ppid=1 pid=7074 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:13.807000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:13.809283 sshd[7074]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:18:13.813523 systemd-logind[1589]: New session 23 of user core. Jul 2 11:18:13.814406 systemd[1]: Started session-23.scope. Jul 2 11:18:13.818000 audit[7074]: USER_START pid=7074 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:13.819000 audit[7076]: CRED_ACQ pid=7076 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:13.958811 sshd[7074]: pam_unix(sshd:session): session closed for user core Jul 2 11:18:13.958000 audit[7074]: USER_END pid=7074 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:13.958000 audit[7074]: CRED_DISP pid=7074 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:13.960439 systemd[1]: sshd@22-147.75.203.5:22-139.178.68.195:46654.service: Deactivated successfully. Jul 2 11:18:13.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-147.75.203.5:22-139.178.68.195:46654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:13.960881 systemd[1]: session-23.scope: Deactivated successfully. Jul 2 11:18:13.961210 systemd-logind[1589]: Session 23 logged out. Waiting for processes to exit. Jul 2 11:18:13.961785 systemd-logind[1589]: Removed session 23. Jul 2 11:18:15.955000 audit[5637]: AVC avc: denied { watch } for pid=5637 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.4023250919/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c977 tclass=file permissive=0 Jul 2 11:18:15.955000 audit[5637]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001174140 a2=fc6 a3=0 items=0 ppid=5526 pid=5637 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c977 key=(null) Jul 2 11:18:15.955000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:18:16.232000 audit[5686]: AVC avc: denied { watch } for pid=5686 comm="apiserver" path="/calico-apiserver-certs/..2024_07_02_11_12_12.1092965845/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c783,c908 tclass=file permissive=0 Jul 2 11:18:16.232000 audit[5686]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0018b7ca0 a2=fc6 a3=0 items=0 ppid=5560 pid=5686 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c783,c908 key=(null) Jul 2 11:18:16.232000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Jul 2 11:18:17.389000 audit[7099]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=7099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:18:17.415793 kernel: kauditd_printk_skb: 63 callbacks suppressed Jul 2 11:18:17.415847 kernel: audit: type=1325 audit(1719919097.389:1486): table=filter:125 family=2 entries=20 op=nft_register_rule pid=7099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:18:17.389000 audit[7099]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffde1b176f0 a2=0 a3=7ffde1b176dc items=0 ppid=2850 pid=7099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:17.475345 kernel: audit: type=1300 audit(1719919097.389:1486): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffde1b176f0 a2=0 a3=7ffde1b176dc items=0 ppid=2850 pid=7099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:17.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:18:17.629468 kernel: audit: type=1327 audit(1719919097.389:1486): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:18:17.632000 audit[7099]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=7099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:18:17.632000 audit[7099]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffde1b176f0 a2=0 a3=7ffde1b176dc items=0 ppid=2850 pid=7099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:17.788619 kernel: audit: type=1325 audit(1719919097.632:1487): table=nat:126 family=2 entries=106 op=nft_register_chain pid=7099 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 11:18:17.788659 kernel: audit: type=1300 audit(1719919097.632:1487): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffde1b176f0 a2=0 a3=7ffde1b176dc items=0 ppid=2850 pid=7099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:17.788678 kernel: audit: type=1327 audit(1719919097.632:1487): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:18:17.632000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 11:18:18.971162 systemd[1]: Started sshd@23-147.75.203.5:22-139.178.68.195:46662.service. Jul 2 11:18:18.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.203.5:22-139.178.68.195:46662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:19.062309 kernel: audit: type=1130 audit(1719919098.971:1488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.203.5:22-139.178.68.195:46662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:19.088000 audit[7102]: USER_ACCT pid=7102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:19.088656 sshd[7102]: Accepted publickey for core from 139.178.68.195 port 46662 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:18:19.090808 sshd[7102]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:18:19.093348 systemd-logind[1589]: New session 24 of user core. Jul 2 11:18:19.093856 systemd[1]: Started session-24.scope. Jul 2 11:18:19.172639 sshd[7102]: pam_unix(sshd:session): session closed for user core Jul 2 11:18:19.174039 systemd[1]: sshd@23-147.75.203.5:22-139.178.68.195:46662.service: Deactivated successfully. Jul 2 11:18:19.174487 systemd[1]: session-24.scope: Deactivated successfully. Jul 2 11:18:19.174805 systemd-logind[1589]: Session 24 logged out. Waiting for processes to exit. Jul 2 11:18:19.175236 systemd-logind[1589]: Removed session 24. Jul 2 11:18:19.090000 audit[7102]: CRED_ACQ pid=7102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:19.272588 kernel: audit: type=1101 audit(1719919099.088:1489): pid=7102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:19.272626 kernel: audit: type=1103 audit(1719919099.090:1490): pid=7102 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:19.272650 kernel: audit: type=1006 audit(1719919099.090:1491): pid=7102 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Jul 2 11:18:19.090000 audit[7102]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff93537c50 a2=3 a3=0 items=0 ppid=1 pid=7102 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:19.090000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:19.095000 audit[7102]: USER_START pid=7102 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:19.096000 audit[7104]: CRED_ACQ pid=7104 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:19.173000 audit[7102]: USER_END pid=7102 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:19.173000 audit[7102]: CRED_DISP pid=7102 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:19.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-147.75.203.5:22-139.178.68.195:46662 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:24.181847 systemd[1]: Started sshd@24-147.75.203.5:22-139.178.68.195:59282.service. Jul 2 11:18:24.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.203.5:22-139.178.68.195:59282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:24.209442 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 11:18:24.209507 kernel: audit: type=1130 audit(1719919104.181:1497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.203.5:22-139.178.68.195:59282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:24.325000 audit[7161]: USER_ACCT pid=7161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:24.325866 sshd[7161]: Accepted publickey for core from 139.178.68.195 port 59282 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:18:24.329938 sshd[7161]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:18:24.340986 systemd-logind[1589]: New session 25 of user core. Jul 2 11:18:24.343240 systemd[1]: Started session-25.scope. Jul 2 11:18:24.328000 audit[7161]: CRED_ACQ pid=7161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:24.426425 sshd[7161]: pam_unix(sshd:session): session closed for user core Jul 2 11:18:24.427910 systemd[1]: sshd@24-147.75.203.5:22-139.178.68.195:59282.service: Deactivated successfully. Jul 2 11:18:24.428352 systemd[1]: session-25.scope: Deactivated successfully. Jul 2 11:18:24.428642 systemd-logind[1589]: Session 25 logged out. Waiting for processes to exit. Jul 2 11:18:24.429056 systemd-logind[1589]: Removed session 25. Jul 2 11:18:24.508569 kernel: audit: type=1101 audit(1719919104.325:1498): pid=7161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:24.508607 kernel: audit: type=1103 audit(1719919104.328:1499): pid=7161 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:24.508625 kernel: audit: type=1006 audit(1719919104.328:1500): pid=7161 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Jul 2 11:18:24.567695 kernel: audit: type=1300 audit(1719919104.328:1500): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7eeae2e0 a2=3 a3=0 items=0 ppid=1 pid=7161 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:24.328000 audit[7161]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7eeae2e0 a2=3 a3=0 items=0 ppid=1 pid=7161 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:24.660480 kernel: audit: type=1327 audit(1719919104.328:1500): proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:24.328000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:24.691334 kernel: audit: type=1105 audit(1719919104.351:1501): pid=7161 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:24.351000 audit[7161]: USER_START pid=7161 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:24.786676 kernel: audit: type=1103 audit(1719919104.353:1502): pid=7163 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:24.353000 audit[7163]: CRED_ACQ pid=7163 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:24.876110 kernel: audit: type=1106 audit(1719919104.426:1503): pid=7161 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:24.426000 audit[7161]: USER_END pid=7161 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:24.426000 audit[7161]: CRED_DISP pid=7161 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:24.973331 kernel: audit: type=1104 audit(1719919104.426:1504): pid=7161 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:24.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-147.75.203.5:22-139.178.68.195:59282 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:29.436144 systemd[1]: Started sshd@25-147.75.203.5:22-139.178.68.195:59298.service. Jul 2 11:18:29.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.203.5:22-139.178.68.195:59298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:29.463472 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 11:18:29.463529 kernel: audit: type=1130 audit(1719919109.435:1506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.203.5:22-139.178.68.195:59298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:29.579000 audit[7185]: USER_ACCT pid=7185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:29.580494 sshd[7185]: Accepted publickey for core from 139.178.68.195 port 59298 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:18:29.582381 sshd[7185]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:18:29.584847 systemd-logind[1589]: New session 26 of user core. Jul 2 11:18:29.585274 systemd[1]: Started session-26.scope. Jul 2 11:18:29.664074 sshd[7185]: pam_unix(sshd:session): session closed for user core Jul 2 11:18:29.665659 systemd[1]: sshd@25-147.75.203.5:22-139.178.68.195:59298.service: Deactivated successfully. Jul 2 11:18:29.666128 systemd[1]: session-26.scope: Deactivated successfully. Jul 2 11:18:29.666500 systemd-logind[1589]: Session 26 logged out. Waiting for processes to exit. Jul 2 11:18:29.667028 systemd-logind[1589]: Removed session 26. Jul 2 11:18:29.674269 kernel: audit: type=1101 audit(1719919109.579:1507): pid=7185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:29.674305 kernel: audit: type=1103 audit(1719919109.580:1508): pid=7185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:29.580000 audit[7185]: CRED_ACQ pid=7185 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:29.823445 kernel: audit: type=1006 audit(1719919109.580:1509): pid=7185 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Jul 2 11:18:29.823484 kernel: audit: type=1300 audit(1719919109.580:1509): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdae3b0480 a2=3 a3=0 items=0 ppid=1 pid=7185 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:29.580000 audit[7185]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdae3b0480 a2=3 a3=0 items=0 ppid=1 pid=7185 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:29.915547 kernel: audit: type=1327 audit(1719919109.580:1509): proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:29.580000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:29.946101 kernel: audit: type=1105 audit(1719919109.586:1510): pid=7185 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:29.586000 audit[7185]: USER_START pid=7185 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:30.040616 kernel: audit: type=1103 audit(1719919109.587:1511): pid=7187 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:29.587000 audit[7187]: CRED_ACQ pid=7187 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:30.129835 kernel: audit: type=1106 audit(1719919109.663:1512): pid=7185 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:29.663000 audit[7185]: USER_END pid=7185 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:30.225335 kernel: audit: type=1104 audit(1719919109.663:1513): pid=7185 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:29.663000 audit[7185]: CRED_DISP pid=7185 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:29.664000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-147.75.203.5:22-139.178.68.195:59298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:34.673727 systemd[1]: Started sshd@26-147.75.203.5:22-139.178.68.195:58370.service. Jul 2 11:18:34.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.203.5:22-139.178.68.195:58370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:34.700796 kernel: kauditd_printk_skb: 1 callbacks suppressed Jul 2 11:18:34.700859 kernel: audit: type=1130 audit(1719919114.672:1515): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.203.5:22-139.178.68.195:58370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 11:18:34.815000 audit[7215]: USER_ACCT pid=7215 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:34.816441 sshd[7215]: Accepted publickey for core from 139.178.68.195 port 58370 ssh2: RSA SHA256:Sj9QnLcvpWLOP1yrdw8OYb14dJ/sKC+z0D/PNZW8QiA Jul 2 11:18:34.817602 sshd[7215]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 11:18:34.819968 systemd-logind[1589]: New session 27 of user core. Jul 2 11:18:34.820484 systemd[1]: Started session-27.scope. Jul 2 11:18:34.896431 sshd[7215]: pam_unix(sshd:session): session closed for user core Jul 2 11:18:34.897793 systemd[1]: sshd@26-147.75.203.5:22-139.178.68.195:58370.service: Deactivated successfully. Jul 2 11:18:34.898223 systemd[1]: session-27.scope: Deactivated successfully. Jul 2 11:18:34.898587 systemd-logind[1589]: Session 27 logged out. Waiting for processes to exit. Jul 2 11:18:34.899089 systemd-logind[1589]: Removed session 27. Jul 2 11:18:34.816000 audit[7215]: CRED_ACQ pid=7215 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:34.998224 kernel: audit: type=1101 audit(1719919114.815:1516): pid=7215 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:34.998327 kernel: audit: type=1103 audit(1719919114.816:1517): pid=7215 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:34.998365 kernel: audit: type=1006 audit(1719919114.816:1518): pid=7215 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Jul 2 11:18:34.816000 audit[7215]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf38c8b60 a2=3 a3=0 items=0 ppid=1 pid=7215 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:35.148846 kernel: audit: type=1300 audit(1719919114.816:1518): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf38c8b60 a2=3 a3=0 items=0 ppid=1 pid=7215 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 11:18:35.148894 kernel: audit: type=1327 audit(1719919114.816:1518): proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:34.816000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 11:18:34.821000 audit[7215]: USER_START pid=7215 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:35.273852 kernel: audit: type=1105 audit(1719919114.821:1519): pid=7215 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:35.273922 kernel: audit: type=1103 audit(1719919114.821:1520): pid=7217 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:34.821000 audit[7217]: CRED_ACQ pid=7217 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:34.895000 audit[7215]: USER_END pid=7215 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:35.458585 kernel: audit: type=1106 audit(1719919114.895:1521): pid=7215 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:35.458647 kernel: audit: type=1104 audit(1719919114.895:1522): pid=7215 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:34.895000 audit[7215]: CRED_DISP pid=7215 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Jul 2 11:18:34.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-147.75.203.5:22-139.178.68.195:58370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'